1 |
V. Sujatha, "Auditing of Storage Security on Encryption", Asia-pacific Journal of Convergent Research Interchange, Vol.3, No.2, pp. 1-9, June 30, 2017. DOI: http://dx.doi.org/10.21742/APJCRI.2017.06.01
DOI
|
2 |
Byeong-Hyun Min, SiChul Kim, "Study on Growth Strategies of the Magazine Industry in the Digital Platform", Asia-pacific Journal of Convergent Research Interchange, pp. 65-72, Vol.3, No.4, December 31, 2017. DOI: http://dx.doi.org/10.14257/apjcri.2017.12.06.
DOI
|
3 |
Cheon J. H., Yi J. H., "Fast batch verification of multiple signatures", Proceedings of Public Key Cryptography, Beijing, China, 2007, pp.442-457. DOI: https://doi.org/10.1007/978-3-540-71677-8_29
DOI
|
4 |
Bayat M., Barmshoory M., Rahimi M., et al. "A secure authentication scheme for VANETs with batch verification", Wire-less Networks, Vol.21, No.5, pp.1733-1743, December 23, 2014. DOI: https://doi.org/10.1007/s11276-014-0881-0
DOI
|
5 |
Chinese Encryption Administration, Public key cryptography algorithm SM2 based on elliptic curves, ISBN 0003-2012, Beijing, March 21, 2012. (in Chinese) WEB: http://www.gmbz.org.cn/upload/2018-07-24/1532401863206085511.pdf
|
6 |
Djebaili K., Melkemi L., "Security and robustness of a modified elgamal encryption scheme", International Journal of Information and Communication Technology, Vol.13, No.3, pp.375-387, September 5, 2018. WEB: https://ur.booksc.eu/dl/75214976/11930b
DOI
|
7 |
Harn L., "Batch verifying multiple DSA-type digital signatures", Electronics Letters, Vol.34, No.9, pp.870-871, April 30, 1998. WEB: http://h.web.umkc.edu/harnl/papers/1998%20J1.pdf
DOI
|
8 |
Hwang M. S., Lee C. C., "Cryptanalysis of the batch verifying multiple DSA-type digital signature", Pakistan Journal of Applied Sciences, Vol.1, No.3, pp.287-288, September 30, 2001. DOI: https://dx.doi.org/10.3923/jas.2001.287.288
DOI
|
9 |
Harn L., "Batch verifying multiple RSA digital signatures", Electronics Letters, Vol.34, No.12, pp.1219-1220, June 11, 1998. DOI: https://doi.org/10.1049/el:19980833
DOI
|
10 |
Kittur A. S., Jain A., Pais A. R., "Fast verification of digital signatures in IoT", Proceedigns of the International Symposium on Security in Computing and Communication, Manipal, India, 2017, pp.16-27. DOI: https://doi.org/10.1007/978-981-10-6898-0_2
DOI
|
11 |
Sangbong Nam, Donoung Lee, "Developing Digital Musical Instrument, mPoi, by Taking Advantage of Sensor Interfaces: Focused on the Multimedia Music Piece, "Jwibul"", Asia-pacific Journal of Convergent Research Interchange, pp. 11-19, Vol.6, No.7, July 31, 2020. DOI: http://dx.doi.org/10.47116/apjcri.2020.07.02
DOI
|
12 |
Lim C. H., Lee P. J., "Security of interactive DSA batch verification", Electronics Letters, Vol.30, No.19, pp.1592-1593, September 15, 1994. DOI: https://doi.org/10.1049/el:19941112
DOI
|
13 |
Antipa A., Brown D., Gallant R., et al. "Accelerated verification of ECDSA signatures", Proceedings of the International Workshop on Selected Areas in Cryptography, Kingston, ON, Canada, 2005, pp.307-318. DOI: https://doi.org/10.1007/11693383_21
DOI
|
14 |
Bernstein D. J., Doumen J., Lange T, et al. "Faster batch forgery identification", Proceedings of International Conference on Cryptology in India, Kolkata, India, 2012, pp.454-473. DOI: https://doi.org/10.1007/978-3-642-34931-7_26
DOI
|
15 |
Karati S., Das A., Roychowdhury D, et al. "New algorithms for batch verification of standard ECDSA signatures", Journal of Cryptographic Engineering, Vol.4, No.4, pp.237-258. November 30, 2014. DOI: https://doi.org/10.1007/s13389-014-0082-x
DOI
|
16 |
Hwang M. S., Lin I. C., Hwang K. F., "Crypt analysis of the batch verifying multiple RSA digital signatures", Informatica, Vol.11, No.1, pp.15-19, January 31, 2000. WEB: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.121.3241&rep=rep1&type=pdf
|
17 |
K. Asish vardhan, "Some Studies on Digital Image Segmentation Techniques", Asia-pacific Journal of Convergent Research Interchange, Vol.5, No.1, pp. 77-89, March 31, 2019. DOI: http://dx.doi.org/10.21742/apjcri.2019.03.08
DOI
|
18 |
Kittur A. S., Pais A. R. "A new batch verifications scheme for ECDSA* signatures", Sadhana, Vol.44, Article No.157, pp.157-169, June 7, 2019. DOI: https://doi.org/10.1007/s12046-019-1142-9
DOI
|
19 |
Kui-hwa Park, "Impact of Digital Convergence Technology on the Logistics Value Chain", Asia-pacific Journal of Convergent Research Interchange, Vol.7, No.1, pp. 33-48, January 31, 2021. DOI: http://dx.doi.org/10.47116/apjcri.2021.01.04
DOI
|
20 |
Yuan Lin, "Research on Interactively Digital Display for Cultural Heritage- Discovering the Hall of Mental Cultivation: A Digital Experience Exhibition", Asia-pacific Journal of Convergent Research Interchange, Vol.6, No.8, pp. 51-67, August 31, 2020. DOI: http://dx.doi.org/10.47116/apjcri.2020.08.06
DOI
|
21 |
Su Min Shin, Vandana Roy, "Hybrid key-Based Encryption in Cloud Storage", Asia-pacific Journal of Convergent Research Interchange, Vol.2, No.3, pp. 29-34, September 30, 2016 DOI: http://dx.doi.org/10.21742/APJCRI.2016.09.04
DOI
|
22 |
Bao F., Lee C. C., Hwang M. S., "Crypt analysis and improvement on batch verifying multiple RSA digital signatures", Applied Mathematics and Computation, Vol.172, No.2, pp.1195-1200, January 15, 2006. DOI: https://doi.org/10.1016/j.amc.2005.03.016
DOI
|
23 |
Johnson D., Menezes A., "The elliptic curve digital signature algorithm (ECDSA)", International Journal on Information Security, Vol.1, No.1, pp.36-63, January 31, 2001. DOI: https://doi.org/10.1007/s102070100002
DOI
|
24 |
Naccache D., M' Raihi D., Vaudenay S., et al. "Can D.S.A be improved? Complexity trade-offs with the digital signature standard", Proceedings of Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, 1994, pp.77-85. DOI: https://doi.org/10.1007/BFb0053426
DOI
|
25 |
Jung Hyun Kim, "Proposal for Advanced Attribute-based Encryption in Mobile Cloud Computing", Asia-pacific Journal of Convergent Research Interchange, Vol.1, No.4, pp. 45-51, December 31, 2015. DOI: http://dx.doi.org/10.21742/apjcri.2015.12.07
DOI
|
26 |
Pavan Yadav, "Advanced Looping Broadcast Proxy Re-Encryption in Cloud computing", Asia-pacific Journal of Convergent Research Interchange, Vol.2, No.1, pp. 21-28, March 31, 2016. DOI: http://dx.doi.org/10.21742/APJCRI.2016.03.04
DOI
|
27 |
Jae Yoon Lee, Mounika Durbha, "Customary Broadcast Encryption with Advanced Encryption and Short ciphertexts", Asia-pacific Journal of Convergent Research Interchange, Vol.2, No.2, pp. 27-33, June 30, 2016. DOI: http://dx.doi.org/10.21742/APJCRI.2016.06.04
DOI
|
28 |
Bhargavi Nadella, "Data Encryption using Geometric Range", Asia-pacific Journal of Convergent Research Interchange, Vol.2, No.3, pp. 21-28, September 30, 2016. DOI: http://dx.doi.org/10.21742/APJCRI.2016.09.03
DOI
|
29 |
Harn L, "DSA type secure interactive batch verification protocol", Electronics Letters, Vol.34, No.4, pp.257-258, February 16, 1995 DOI: https://doi.org/10.1049/el:19950203
DOI
|
30 |
Hwang M. S., Lee C. C., Tang Y. L., "Two simple batch verifying multiple digital signatures", Proceedings of Information and Communications Security, Xian, China, 2001, pp.233-237. DOI: https://doi.org/10.1007/3-540-45600-7_26
DOI
|