
International Journal of Applied Cryptography
2022 Vol.4 No.2
| Pages | Title and author(s) |
| 61-84 | A reduction-based proof for authentication and session key security in three-party KerberosJörg Schwenk; Douglas Stebila DOI: 10.1504/IJACT.2022.130832 |
| 85-103 | End-to-end verifiable cumulative voting without tallying authoritiesSamiran Bag; Muhammad Ajmal Azad; Feng Hao DOI: 10.1504/IJACT.2022.130833 |
| 104-120 | Authority revocation scheme for MA-CP-ABE-based secure communication in IoMT ecosystemShardha Porwal; Sangeeta Mittal DOI: 10.1504/IJACT.2022.130846 |
| 121-142 | A novel architecture to make anonymous blind signature-based e-coins more efficient and applicableZhuo Qi Chen DOI: 10.1504/IJACT.2022.130847 |