Works matching DE "GROUP signatures (Computer security)"


Results: 58
    1
    2

    TRACEABLE IDENTITY-BASED GROUP SIGNATURE.

    Published in:
    RAIRO - Theoretical Informatics & Applications, 2016, v. 50, n. 3, p. 193, doi. 10.1051/ita/2016021
    By:
    • KE GU;
    • LIHAO YANG;
    • YONG WANG;
    • SHENG WEN
    Publication type:
    Article
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26
    27
    28
    29
    30

    Robust Deniable Authentication Protocol.

    Published in:
    Wireless Personal Communications, 2010, v. 55, n. 1, p. 81, doi. 10.1007/s11277-009-9787-z
    By:
    • Eun-Jun Yoon;
    • Kee-Young Yoo;
    • Sang-Soo Yeo;
    • Lee, Changhoon
    Publication type:
    Article
    31
    32
    33

    Lattice-based deniable ring signatures.

    Published in:
    International Journal of Information Security, 2019, v. 18, n. 3, p. 355, doi. 10.1007/s10207-018-0417-1
    By:
    • Gao, Wen;
    • Chen, Liqun;
    • Hu, Yupu;
    • Newton, Christopher J. P.;
    • Wang, Baocang;
    • Chen, Jiangshan
    Publication type:
    Article
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44
    45
    46
    47
    48
    49
    50