
International Journal of Applied Cryptography
2022 Vol.4 No.2
Pages | Title and author(s) |
61-84 | A reduction-based proof for authentication and session key security in three-party KerberosJörg Schwenk; Douglas Stebila DOI: 10.1504/IJACT.2022.130832 |
85-103 | End-to-end verifiable cumulative voting without tallying authoritiesSamiran Bag; Muhammad Ajmal Azad; Feng Hao DOI: 10.1504/IJACT.2022.130833 |
104-120 | Authority revocation scheme for MA-CP-ABE-based secure communication in IoMT ecosystemShardha Porwal; Sangeeta Mittal DOI: 10.1504/IJACT.2022.130846 |
121-142 | A novel architecture to make anonymous blind signature-based e-coins more efficient and applicableZhuo Qi Chen DOI: 10.1504/IJACT.2022.130847 |