Works matching DE "GROUP signatures (Computer security)"
1
- Malaysian Journal of Computer Science, 2012, v. 25, n. 1, p. 11
- Fenghe Wang;
- Yupu Hu;
- Baocang Wang
- Article
2
- Information Systems Frontiers, 2013, v. 15, n. 1, p. 133, doi. 10.1007/s10796-011-9312-2
- Sun, Yanbin;
- Sun, Yan;
- Luo, Mingxing;
- Gu, Lize;
- Zheng, Shihui;
- Yang, Yixian
- Article
3
- Information Systems Frontiers, 2009, v. 11, n. 3, p. 335, doi. 10.1007/s10796-008-9094-3
- Lee, Cheng-Chi;
- Ho, Pi-Fang;
- Hwang, Min-Shiang
- Article
4
- Journal of Cryptology, 2016, v. 29, n. 2, p. 363, doi. 10.1007/s00145-014-9196-7
- Abe, Masayuki;
- Fuchsbauer, Georg;
- Groth, Jens;
- Haralambiev, Kristiyan;
- Ohkubo, Miyako
- Article
5
- Electronic Journal of Differential Equations, 2017, v. 2017, n. 200-311, p. 1
- GOLUMBEANU, ALIN IONUŢ;
- ŢICLEANU, OANA ADRIANA
- Article
6
- Computer Journal, 2016, v. 59, n. 4, p. 559, doi. 10.1093/comjnl/bxv080
- JIANNAN WEI;
- GUOMIN YANG;
- YI MU;
- LIANG, KAITAI
- Article
7
- Computer Journal, 2015, v. 58, n. 10, p. 2698, doi. 10.1093/comjnl/bxv026
- ATTRAPADUNG, NUTTAPONG;
- EMURA, KEITA;
- GOICHIRO HANAOKA;
- YUSUKE SAKAI
- Article
8
- Computer Journal, 2000, v. 43, n. 4, p. 301, doi. 10.1093/comjnl/43.4.301
- Tousidou, Eleni;
- Nanopoulos, Alex;
- Manolopoulos, Yannis
- Article
9
- IETE Journal of Research, 2013, v. 59, n. 4, p. 376, doi. 10.4103/0377-2063.118032
- Hu Xiong;
- Zhiguang Qin;
- Fagen Li
- Article
10
- Quantum Information Processing, 2015, v. 14, n. 7, p. 2577, doi. 10.1007/s11128-015-0995-z
- Xu, Guang-Bao;
- Zhang, Ke-Jia
- Article
11
- Quantum Information Processing, 2014, v. 13, n. 8, p. 1677, doi. 10.1007/s11128-014-0760-8
- Wang, Tian-Yin;
- Cai, Xiao-Qiu;
- Zhang, Rui-Ling
- Article
12
- Multimedia Systems, 2011, v. 17, n. 5, p. 421, doi. 10.1007/s00530-010-0223-8
- Jialie Shen;
- Zhiyong Cheng
- Article
13
- Journal of Applied Security Research, 2017, v. 12, n. 3, p. 440, doi. 10.1080/19361610.2017.1315761
- Sarde, Pankaj;
- Banerjee, Amitabh;
- Dewangan, C. L.
- Article
14
- Informatica (03505596), 2017, v. 41, n. 1, p. 31
- Reddi, Sivaranjani;
- Borra, Surekha
- Article
15
- Informatica (03505596), 2012, v. 36, n. 1, p. 75
- Xingwen Zhao;
- Fangguo Zhang
- Article
16
- International Journal of Quantum Information, 2016, v. 14, n. 8, p. -1, doi. 10.1142/S0219749916500416
- Article
17
- International Journal of Quantum Information, 2012, v. 10, n. 4, p. -1, doi. 10.1142/S0219749912500414
- YIN, XUN-RU;
- MA, WEN-PING;
- LIU, WEI-YAN
- Article
18
- Acta Informatica, 2017, v. 54, n. 5, p. 521, doi. 10.1007/s00236-016-0270-5
- Gu, Ke;
- Jia, Weijia;
- Wang, Guojun;
- Wen, Sheng
- Article
19
- International Journal of Theoretical Physics, 2020, v. 59, n. 3, p. 719, doi. 10.1007/s10773-019-04358-3
- Zhang, Xiao;
- Zhang, Jian-Zhong;
- Xie, Shu-Cui
- Article
20
- International Journal of Theoretical Physics, 2014, v. 53, n. 4, p. 1208, doi. 10.1007/s10773-013-1917-4
- Article
21
- International Journal of Theoretical Physics, 2012, v. 51, n. 4, p. 1038, doi. 10.1007/s10773-011-0978-5
- Shi, Jinjing;
- Shi, Ronghua;
- Guo, Ying;
- Peng, Xiaoqi;
- Lee, Moon;
- Park, Dongsun
- Article
22
- Journal of Applied Mathematics, 2014, p. 1, doi. 10.1155/2014/983040
- Keita Emura;
- Atsuko Miyaji;
- Kazumasa Omote
- Article
23
- International Journal of Computer Mathematics, 2013, v. 90, n. 12, p. 2614, doi. 10.1080/00207160.2013.807916
- Chen, Yu-Yi;
- Wang, Yao-Jen;
- Jan, Jinn-Ke
- Article
24
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 586, doi. 10.3969/j.issn.1001-3695.2014.02.064
- Article
25
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 551, doi. 10.3969/j.issn.1001-3695.2014.02.055
- Article
26
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 1, p. 23, doi. 10.3969/j.issn.1001-3695.2014.01.004
- CHEN Liang;
- CHEN Xing-yuan;
- SUN Yi;
- DU Xue-hui
- Article
27
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 1, p. 226, doi. 10.3969/j.issn.1001-3695.2014.01.053
- ZHU Xiao-ling;
- LU Yang;
- HOU Zheng-feng;
- ZHU Xiao-juan
- Article
28
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 1, p. 213, doi. 10.3969/j.issn.1001-3695.2014.01.050
- Article
29
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 10, p. 2881, doi. 10.3969/j.issn.1001-3695.2013.10.001
- CHENG Xiao-gang;
- WANG Jian;
- DU Ji-xiang
- Article
30
- Telecommunication Systems, 2015, v. 58, n. 4, p. 293, doi. 10.1007/s11235-014-9878-3
- Malina, Lukas;
- Hajny, Jan;
- Vives-Guasch, Arnau;
- Castellà-Roca, Jordi;
- Viejo, Alexandre
- Article
31
- Security & Communication Networks, 2016, v. 9, n. 12, p. 1810, doi. 10.1002/sec.859
- Zeng, Shengke;
- Li, Qinyi;
- Qin, Zhiguang;
- Lu, Qing
- Article
32
- Security & Communication Networks, 2016, v. 9, n. 7, p. 599, doi. 10.1002/sec.1383
- Malina, Lukas;
- Hajny, Jan;
- Zeman, Vaclav
- Article
33
- Security & Communication Networks, 2015, v. 8, n. 6, p. 937, doi. 10.1002/sec.1051
- Zhang, Wenfang;
- Wang, Xiaomin;
- Khan, Muhammad Khurram
- Article
34
- Security & Communication Networks, 2015, v. 8, n. 6, p. 952, doi. 10.1002/sec.1052
- Ji, Yuede;
- Li, Qiang;
- He, Yukun;
- Guo, Dong
- Article
35
- Security & Communication Networks, 2015, v. 8, n. 2, p. 298, doi. 10.1002/sec.980
- Chen, Jiageng;
- Mamun, Mohammad Saiful Islam;
- Miyaji, Atsuko
- Article
36
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1764, doi. 10.1002/sec.873
- Article
37
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 5, p. 2407, doi. 10.3837/tiis.2016.05.025
- Run Xie;
- Chunxiang Xu;
- Chanlian He;
- Xiaojun Zhang
- Article
38
- Journal of Information System Security, 2014, v. 10, n. 2, p. 3
- Sommestad, Teodor;
- Holm, Hannes;
- Ekstedt, Mathias;
- Honeth, Nicholas
- Article
39
- Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 648, doi. 10.1093/jigpal/jzs035
- Durán Díaz, R.;
- Hernández Encinas, L.;
- Muñoz Masqué, J.
- Article
40
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 2973, doi. 10.1007/s11277-017-3979-8
- Wang, Ting;
- Han, Guoqiang;
- Yu, Jianping;
- Zhang, Peng;
- Sun, Xiaoqiang
- Article
41
- Wireless Personal Communications, 2016, v. 87, n. 2, p. 431, doi. 10.1007/s11277-015-3070-2
- Saravana Kumar, N.;
- Deepa, S.;
- Marimuthu, C.;
- Eswari, T.;
- Lavanya, S.
- Article
42
- Wireless Personal Communications, 2015, v. 80, n. 3, p. 1281, doi. 10.1007/s11277-014-2087-2
- Kumar, Raman;
- Verma, Harsh;
- Dhir, Renu
- Article
43
- Wireless Personal Communications, 2010, v. 55, n. 1, p. 19, doi. 10.1007/s11277-009-9783-3
- Article
44
- Wireless Personal Communications, 2010, v. 55, n. 1, p. 81, doi. 10.1007/s11277-009-9787-z
- Eun-Jun Yoon;
- Kee-Young Yoo;
- Sang-Soo Yeo;
- Lee, Changhoon
- Article
45
- Transactions on Emerging Telecommunications Technologies, 2015, v. 26, n. 4, p. 547, doi. 10.1002/ett.2667
- Sahu, Rajeev Anand;
- Padhye, Sahadeo
- Article
46
- PLoS ONE, 2015, v. 10, n. 7, p. 1, doi. 10.1371/journal.pone.0131550
- Shi, Yang;
- Zhao, Qinpei;
- Fan, Hongfei;
- Liu, Qin
- Article
47
- Multimedia Tools & Applications, 2014, v. 72, n. 3, p. 2723, doi. 10.1007/s11042-013-1555-0
- Eslami, Ziba;
- Kazemnasabhaji, Mohammad;
- Mirehi, Narges
- Article
48
- International Journal of Information Security, 2019, v. 18, n. 3, p. 355, doi. 10.1007/s10207-018-0417-1
- Gao, Wen;
- Chen, Liqun;
- Hu, Yupu;
- Newton, Christopher J. P.;
- Wang, Baocang;
- Chen, Jiangshan
- Article
49
- International Journal of Information Security, 2015, v. 14, n. 4, p. 335, doi. 10.1007/s10207-014-0259-4
- Isern-Deyà, Andreu;
- Huguet-Rotger, Llorenç;
- Payeras-Capellà, M.;
- Mut-Puigserver, Macià
- Article
50
- International Journal of Information Security, 2014, v. 13, n. 1, p. 51, doi. 10.1007/s10207-013-0204-y
- Emura, Keita;
- Hanaoka, Goichiro;
- Sakai, Yusuke;
- Schuldt, Jacob
- Article