Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,180,260 papers from all fields of science
Search
Sign In
Create Free Account
Batch cryptography
Batch cryptography is the area of cryptology where cryptographic protocols are studied and developed for doing cryptographic processes like…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
5 relations
Authentication
Cryptographic protocol
Encryption
Key exchange
Broader (1)
Cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
An Efficient Batch Authentication Scheme to Identify Invalid Signatures in Mobile Computing
Mohamed Yusuf
,
Student
2018
Corpus ID: 212563729
: Secure access is one of the fundamental problems in mobile computing. Digital signature is a widely used technique to protect…
Expand
2017
2017
Self Adaptive Automatch Protocol for Batch Identification Mechanism in Wireless Mobile Network
Venkata Lakshmi
2017
Corpus ID: 212555411
--------------------------------------------------------------------------- ABSTRACT: Batch cryptography technique is a powerful…
Expand
2017
2017
A BATCH AUTHENTICATION SCHEMA TO IDENTIFY THE INVALID SIGNATURE IN WIRELESS NETWORK
N.Deepa Assistant Professor
,
Aparna S Student
,
M.Rengesh Student
,
S.Sai
2017
Corpus ID: 212597292
Mobile Computing is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled…
Expand
2016
2016
Secure Certificateless Signature Scheme with Batch Verification from Bilinear Pairings
N. Gayathri
,
P. V. Reddy
International Symposium on Security in Computing…
2016
Corpus ID: 36065014
In view of simplifying certificate management complexities in the traditional Public Key Cryptography (PKC) and to abolish the…
Expand
2015
2015
Game-theory-based batch identification of invalid signatures in wireless mobile networks
J. Chen
,
Quan Yuan
,
G. Xue
,
Ruiying Du
IEEE Conference on Computer Communications
2015
Corpus ID: 2107763
Digital signature has been widely employed in wireless mobile networks to ensure the authenticity of messages and identity of…
Expand
2011
2011
Batch Verification and Finding Invalid Signatures in a Group Signature Scheme
Kitae Kim
,
Ikkwon Yie
,
Seongan Lim
,
Daehun Nyang
International Journal of Network Security
2011
Corpus ID: 3389438
Batch cryptography has been developed into two main branches-batch verification and batch identification. Batch verification is a…
Expand
2011
2011
A Method of Finding Bad Signatures in an RSA-Type Batch Verification
Kitae Kim
,
Ikkwon Yie
,
Seongan Lim
,
Haeryong Park
Informatica
2011
Corpus ID: 1659712
Batch cryptography has been developed into two main branches - batch verification and batch identification. Batch verification is…
Expand
2004
2004
An Efficient Off-line Electronic Cash System with Revocable Anonymity
K. Chiou
,
Wenliang Chen
,
Sung-Ming Yen
2004
Corpus ID: 10185133
Numerous anonymity revocation mechanisms have been proposed for off-line e-cash system in the last decade. Within this category…
Expand
2000
2000
Applied batch cryptography
C. Pavlovski
2000
Corpus ID: 38546689
The material presented in this thesis may be viewed as comprising two key parts, the first part concerns batch cryptography…
Expand
1999
1999
Detachable Electronic Coins
C. Pavlovski
,
C. Boyd
,
Ernest Foo
International Conference on Information…
1999
Corpus ID: 2036935
We propose a non-divisible electronic cash system that combines the restrictive blind signature technique and a batch signature…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE