Different Authentication Properties and a Signcryption Scheme Revisited | IEEE Conference Publication | IEEE Xplore