Qusai Abuein

Learn More
Amortization schemes for authenticating streamed data have been introduced as a solution to reduce the high overhead that sign-each schemes suffer from. The hash chains structure of amortization schemes and the number of hash values appended to other packets affect the efficiency of the authentication scheme specially against packet loss. Which packets(More)
Signature amortization schemes have been introduced for authenticating multicast streams, in which, a single signature is amortized over several packets. The hash value of each packet is computed, some hash values are appended to other packets, forming what is known as hash chain. These schemes divide the stream into blocks, each block is a number of(More)
With the increased advancement in technology and the proliferation of internet applications, electronic mails become an increasingly essential means of communication, for both individuals and organizations. In the recent years, however, spam's become the most unsolicited forms of messages that invade the most important services of internet: Electronic mail(More)
Signcryption is a cryptographic primitive technique that combines digital signature and public key encryption in one logical single step. Signcryption scheme is divided into certificatebased Signcryption scheme, and certificateless Signcryption scheme. In this paper we propose an identity based mutual authentication protocol that provides signed and(More)
  • 1