Return to Article Details An Efficient and Authentication Signcryption Scheme Based on Elliptic Curves Download Download PDF