Deniable ring authentication in concurrent setting.Published in:Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 12, p. 3745, doi. 10.3969/j.issn.1001-3695.2013.12.059By:ZENG Sheng-ke;QIN Zhi-guangPublication type:Article