Certificateless Public Key Cryptography, Advances in Cryptology- ASIACRYPT 2003, pp.452-473, 2003. ,
DOI : 10.1007/978-3-540-40061-5_29
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.8328
Formal Proofs for the Security of Signcryption, Journal of Cryptology, vol.20, issue.2, pp.203-235, 2007. ,
DOI : 10.1007/s00145-007-0211-0
Identity-Based Aggregate and Multi-Signature Schemes Based on RSA, Public Key Cryptography?PKC 2010, pp.480-498, 2010. ,
DOI : 10.1007/978-3-642-13013-7_28
Random oracles are practical, Proceedings of the 1st ACM conference on Computer and communications security , CCS '93, pp.62-73, 1993. ,
DOI : 10.1145/168588.168596
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, pp.276-285, 2007. ,
DOI : 10.1145/1315245.1315280
Short signatures from the weil pairing, Advances in Cryptology- ASIACRYPT, pp.514-532, 2001. ,
DOI : 10.1007/s00145-004-0314-9
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.107.1494
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps, Advances in cryptology-EUROCRYPT, pp.416-432, 2003. ,
DOI : 10.1007/3-540-39200-9_26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.459
Efficient Certificateless Signature Schemes, Applied Cryptography and Network Security, pp.443-458, 2007. ,
DOI : 10.1007/978-3-540-72738-5_29
Efficient and provably-secure certificateless short signature scheme from bilinear pairings, Computer Standards & Interfaces, vol.31, issue.2, pp.390-394, 2009. ,
DOI : 10.1016/j.csi.2008.05.013
An Identity-based Ring Signature Scheme with Enhanced Privacy, 2006 Securecomm and Workshops, pp.1-5, 2006. ,
DOI : 10.1109/SECCOMW.2006.359554
Two Certificateless Aggregate Signatures From Bilinear Maps, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007), pp.188-193, 2007. ,
DOI : 10.1109/SNPD.2007.132
A pairing-free certificateless authenticated key agreement protocol, International Journal of Communication Systems, vol.58, issue.7, pp.221-230, 2012. ,
DOI : 10.1002/dac.1265
Key Replacement Attack Against a Generic Construction of Certificateless Signature, Information Security and Privacy, pp.235-246, 2006. ,
DOI : 10.1007/11780656_20
Certificateless signature: a new security model and an improved generic construction. Designs, Codes and Cryptography, pp.109-126, 2007. ,
On the Security of Certificateless Signature Schemes from Asiacrypt 2003, Cryptology and Network Security, pp.13-25, 2005. ,
DOI : 10.1007/11599371_2
Certificateless Signature Revisited, Information Security and Privacy, pp.308-322, 2007. ,
DOI : 10.1007/978-3-540-73458-1_23
An identity-based security framework For VANETs, Proceedings of the 3rd international workshop on Vehicular ad hoc networks , VANET '06, pp.94-95, 2006. ,
DOI : 10.1145/1161064.1161083
Secure, pseudonymous, and auditable communication in vehicular ad hoc networks, pp.233-244, 2008. ,
Gsis: a secure and privacy-preserving protocol for vehicular communications. Vehicular Technology, IEEE Transactions on, vol.56, issue.6, pp.3442-3456, 2007. ,
Self-generated-certificate public key cryptography and certificateless signature/encryption scheme in the standard model, Proceedings of the 2nd ACM symposium on Information, computer and communications security, pp.273-283, 2007. ,
ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications, IEEE INFOCOM 2008, The 27th Conference on Computer Communications, 2008. ,
DOI : 10.1109/INFOCOM.2008.179
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.564.4866
Sequential Aggregate Signatures from Trapdoor Permutations, Advances in Cryptology-Eurocrypt, pp.74-90, 2004. ,
DOI : 10.1007/978-3-540-24676-3_5
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.110.4025
On security of a certificateless signcryption scheme, Information Sciences, vol.232, pp.475-481, 2013. ,
DOI : 10.1016/j.ins.2011.11.045
Identity-Based Cryptosystems and Signature Schemes, Advances in cryptology, pp.47-53, 1985. ,
DOI : 10.1007/3-540-39568-7_5
TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, pp.1-9, 2009. ,
DOI : 10.1109/SAHCN.2009.5168976
An ID-based Framework Achieving Privacy and Non-Repudiation in Vehicular Ad Hoc Networks, MILCOM 2007, IEEE Military Communications Conference, pp.1-7, 2007. ,
DOI : 10.1109/MILCOM.2007.4454834
Certificateless threshold signature secure in the standard model, Information Sciences, vol.237, pp.73-81, 2013. ,
DOI : 10.1016/j.ins.2010.06.010
Generic Construction of Certificateless Signature, Information Security and Privacy, pp.200-211, 2004. ,
DOI : 10.1007/978-3-540-27800-9_18
A new certificateless aggregate signature scheme, Computer Communications, vol.32, issue.6, pp.1079-1085, 2009. ,
DOI : 10.1016/j.comcom.2008.12.042
Efficient many-to-one authentication with certificateless aggregate signatures, Computer Networks, vol.54, issue.14, pp.2482-2491, 2010. ,
DOI : 10.1016/j.comnet.2010.04.008