Works matching DE "GROUP signatures (Computer security)"
Results: 55
ELLIPTIC CURVES DIFFERENTIATION WITH APPLICATION TO GROUP SIGNATURE SCHEME.
- Published in:
- Electronic Journal of Differential Equations, 2017, v. 2017, n. 200-311, p. 1
- By:
- Publication type:
- Article
Anonymous Proxy Signature with Hierarchical Traceability.
- Published in:
- Computer Journal, 2016, v. 59, n. 4, p. 559, doi. 10.1093/comjnl/bxv080
- By:
- Publication type:
- Article
Revocable Group Signature with Constant-Size Revocation List.
- Published in:
- Computer Journal, 2015, v. 58, n. 10, p. 2698, doi. 10.1093/comjnl/bxv026
- By:
- Publication type:
- Article
Improved Methods for Signature-Tree Construction.
- Published in:
- Computer Journal, 2000, v. 43, n. 4, p. 301, doi. 10.1093/comjnl/43.4.301
- By:
- Publication type:
- Article
Structure-Preserving Signatures and Commitments to Group Elements.
- Published in:
- Journal of Cryptology, 2016, v. 29, n. 2, p. 363, doi. 10.1007/s00145-014-9196-7
- By:
- Publication type:
- Article
LATTICE-BASED STRONG DESIGNATE VERIFIER SIGNATURE AND ITS APPLICATIONS.
- Published in:
- Malaysian Journal of Computer Science, 2012, v. 25, n. 1, p. 11
- By:
- Publication type:
- Article
QUANTIFYING THE EFFECTIVENESS OF INTRUSION DETECTION SYSTEMS IN OPERATION THROUGH DOMAIN EXPERTS.
- Published in:
- Journal of Information System Security, 2014, v. 10, n. 2, p. 3
- By:
- Publication type:
- Article
Non-Interactive Forward-Secure Threshold Signature without Random Oracles.
- Published in:
- Journal of Information Science & Engineering, 2012, v. 28, n. 3, p. 571
- By:
- Publication type:
- Article
Efficient Identity-Committable Signature and Group-Oriented Ring Signature Schemes.
- Published in:
- Journal of Information Science & Engineering, 2009, v. 25, n. 5, p. 1465
- By:
- Publication type:
- Article
The design of speedy seamless safe messaging mechanism in VANET.
- Published in:
- International Journal of Computer Mathematics, 2013, v. 90, n. 12, p. 2614, doi. 10.1080/00207160.2013.807916
- By:
- Publication type:
- Article
Comment on Lee et al.'s group signature and e-auction scheme.
- Published in:
- Information Systems Frontiers, 2013, v. 15, n. 1, p. 133, doi. 10.1007/s10796-011-9312-2
- By:
- Publication type:
- Article
A secure e-auction scheme based on group signatures.
- Published in:
- Information Systems Frontiers, 2009, v. 11, n. 3, p. 335, doi. 10.1007/s10796-008-9094-3
- By:
- Publication type:
- Article
Secure Obfuscation for Encrypted Group Signatures.
- Published in:
- PLoS ONE, 2015, v. 10, n. 7, p. 1, doi. 10.1371/journal.pone.0131550
- By:
- Publication type:
- Article
A novel quantum group signature scheme without using entangled states.
- Published in:
- Quantum Information Processing, 2015, v. 14, n. 7, p. 2577, doi. 10.1007/s11128-015-0995-z
- By:
- Publication type:
- Article
Security of a sessional blind signature based on quantum cryptograph.
- Published in:
- Quantum Information Processing, 2014, v. 13, n. 8, p. 1677, doi. 10.1007/s11128-014-0760-8
- By:
- Publication type:
- Article
Personalized video similarity measure.
- Published in:
- Multimedia Systems, 2011, v. 17, n. 5, p. 421, doi. 10.1007/s00530-010-0223-8
- By:
- Publication type:
- Article
An Efficient Dynamic Group Signature with Non-frameability.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 5, p. 2407, doi. 10.3837/tiis.2016.05.025
- By:
- Publication type:
- Article
SCHNORR RING SIGNATURE SCHEME WITH DESIGNATED REVOCABILITY.
- Published in:
- Intelligent Automation & Soft Computing, 2012, v. 18, n. 6, p. 739, doi. 10.1080/10798587.2012.10643284
- By:
- Publication type:
- Article
Two proposals for group signature schemes based on number theory problems.
- Published in:
- Logic Journal of the IGPL, 2013, v. 21, n. 4, p. 648, doi. 10.1093/jigpal/jzs035
- By:
- Publication type:
- Article
Proxy signatures and buyer-seller watermarking protocols for the protection of multimedia content.
- Published in:
- Multimedia Tools & Applications, 2014, v. 72, n. 3, p. 2723, doi. 10.1007/s11042-013-1555-0
- By:
- Publication type:
- Article
Quantum group signature scheme based on controlled quantum teleportation.
- Published in:
- International Journal of Quantum Information, 2016, v. 14, n. 8, p. -1, doi. 10.1142/S0219749916500416
- By:
- Publication type:
- Article
QUANTUM PROXY GROUP SIGNATURE SCHEME WITH χ-TYPE ENTANGLED STATES.
- Published in:
- International Journal of Quantum Information, 2012, v. 10, n. 4, p. -1, doi. 10.1142/S0219749912500414
- By:
- Publication type:
- Article
Non-interactive deniable ring signature without random oracles.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 12, p. 1810, doi. 10.1002/sec.859
- By:
- Publication type:
- Article
Light-weight group signatures with time-bound membership.
- Published in:
- Security & Communication Networks, 2016, v. 9, n. 7, p. 599, doi. 10.1002/sec.1383
- By:
- Publication type:
- Article
BotCatch: leveraging signature and behavior for bot detection.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 6, p. 952, doi. 10.1002/sec.1052
- By:
- Publication type:
- Article
A virtual bridge certificate authority-based cross-domain authentication mechanism for distributed collaborative manufacturing systems.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 6, p. 937, doi. 10.1002/sec.1051
- By:
- Publication type:
- Article
An efficient batch verification system and its effect in a real time VANET environment.
- Published in:
- Security & Communication Networks, 2015, v. 8, n. 2, p. 298, doi. 10.1002/sec.980
- By:
- Publication type:
- Article
Privacy-preserving framework for geosocial applications.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 1764, doi. 10.1002/sec.873
- By:
- Publication type:
- Article
A Secure Quantum Voting Scheme Based on Quantum Group Blind Signature.
- Published in:
- International Journal of Theoretical Physics, 2020, v. 59, n. 3, p. 719, doi. 10.1007/s10773-019-04358-3
- By:
- Publication type:
- Article
Improved Group Signature Scheme Based on Quantum Teleportation.
- Published in:
- International Journal of Theoretical Physics, 2014, v. 53, n. 4, p. 1208, doi. 10.1007/s10773-013-1917-4
- By:
- Publication type:
- Article
A ( t, n)-Threshold Scheme of Multi-party Quantum Group Signature with Irregular Quantum Fourier Transform.
- Published in:
- International Journal of Theoretical Physics, 2012, v. 51, n. 4, p. 1038, doi. 10.1007/s10773-011-0978-5
- By:
- Publication type:
- Article
An r-Hiding Revocable Group Signature Scheme: Group Signatures with the Property of Hiding the Number of Revoked Users.
- Published in:
- Journal of Applied Mathematics, 2014, p. 1, doi. 10.1155/2014/983040
- By:
- Publication type:
- Article
Efficient hierarchical group signature based on elliptic curve.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 586, doi. 10.3969/j.issn.1001-3695.2014.02.064
- By:
- Publication type:
- Article
Electronic cash system with multiple banks based on TPM for cloud computing.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 2, p. 551, doi. 10.3969/j.issn.1001-3695.2014.02.055
- By:
- Publication type:
- Article
Survey of proxy re-signature technology.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 1, p. 23, doi. 10.3969/j.issn.1001-3695.2014.01.004
- By:
- Publication type:
- Article
Strong privacy protection scheme based on oblivious transfer and group signature in VANET.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 1, p. 226, doi. 10.3969/j.issn.1001-3695.2014.01.053
- By:
- Publication type:
- Article
Deniable attribute-based designated confirmer signature.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 1, p. 213, doi. 10.3969/j.issn.1001-3695.2014.01.050
- By:
- Publication type:
- Article
Survey on group signature.
- Published in:
- Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 10, p. 2881, doi. 10.3969/j.issn.1001-3695.2013.10.001
- By:
- Publication type:
- Article
Lattice-based deniable ring signatures.
- Published in:
- International Journal of Information Security, 2019, v. 18, n. 3, p. 355, doi. 10.1007/s10207-018-0417-1
- By:
- Publication type:
- Article
On the practicability of using group signatures on mobile devices: implementation and performance analysis on the android platform.
- Published in:
- International Journal of Information Security, 2015, v. 14, n. 4, p. 335, doi. 10.1007/s10207-014-0259-4
- By:
- Publication type:
- Article
Group signature implies public-key encryption with non-interactive opening.
- Published in:
- International Journal of Information Security, 2014, v. 13, n. 1, p. 51, doi. 10.1007/s10207-013-0204-y
- By:
- Publication type:
- Article
Toward tracing and revoking schemes secure against collusion and any form of secret information leakage.
- Published in:
- International Journal of Information Security, 2013, v. 12, n. 1, p. 1, doi. 10.1007/s10207-012-0186-1
- By:
- Publication type:
- Article
Efficient strong designated verifier signature schemes without random oracle or with non-delegatability.
- Published in:
- International Journal of Information Security, 2011, v. 10, n. 6, p. 373, doi. 10.1007/s10207-011-0146-1
- By:
- Publication type:
- Article
TRACEABLE IDENTITY-BASED GROUP SIGNATURE.
- Published in:
- RAIRO - Theoretical Informatics & Applications, 2016, v. 50, n. 3, p. 193, doi. 10.1051/ita/2016021
- By:
- Publication type:
- Article
Efficient group signatures for privacy-preserving vehicular networks.
- Published in:
- Telecommunication Systems, 2015, v. 58, n. 4, p. 293, doi. 10.1007/s11235-014-9878-3
- By:
- Publication type:
- Article
A Taxonomy of Ring Signature Schemes: Theory and Applications.
- Published in:
- IETE Journal of Research, 2013, v. 59, n. 4, p. 376, doi. 10.4103/0377-2063.118032
- By:
- Publication type:
- Article
Efficient and secure attribute-based signature for monotone predicates.
- Published in:
- Acta Informatica, 2017, v. 54, n. 5, p. 521, doi. 10.1007/s00236-016-0270-5
- By:
- Publication type:
- Article
Identity-based Signcryption Groupkey Agreement Protocol Using Bilinear Pairing.
- Published in:
- Informatica (03505596), 2017, v. 41, n. 1, p. 31
- By:
- Publication type:
- Article
Times Limited Accountable Anonymous Online Submission Control System from Single-Verifier k-times Group Signature.
- Published in:
- Informatica (03505596), 2012, v. 36, n. 1, p. 75
- By:
- Publication type:
- Article
Efficient Chosen-Ciphertext Secure Encryption from R-LWE.
- Published in:
- Wireless Personal Communications, 2017, v. 95, n. 3, p. 2973, doi. 10.1007/s11277-017-3979-8
- By:
- Publication type:
- Article