Works matching DE "GROUP signatures (Computer security)"


Results: 58
    1
    2
    3
    4
    5
    6
    7
    8
    9
    10
    11
    12
    13
    14
    15
    16
    17
    18
    19
    20
    21
    22
    23
    24
    25
    26

    Survey of proxy re-signature technology.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2014, v. 31, n. 1, p. 23, doi. 10.3969/j.issn.1001-3695.2014.01.004
    By:
    • CHEN Liang;
    • CHEN Xing-yuan;
    • SUN Yi;
    • DU Xue-hui
    Publication type:
    Article
    27
    28
    29

    Survey on group signature.

    Published in:
    Application Research of Computers / Jisuanji Yingyong Yanjiu, 2013, v. 30, n. 10, p. 2881, doi. 10.3969/j.issn.1001-3695.2013.10.001
    By:
    • CHENG Xiao-gang;
    • WANG Jian;
    • DU Ji-xiang
    Publication type:
    Article
    30
    31
    32
    33
    34
    35
    36
    37
    38
    39
    40
    41
    42
    43
    44

    Robust Deniable Authentication Protocol.

    Published in:
    Wireless Personal Communications, 2010, v. 55, n. 1, p. 81, doi. 10.1007/s11277-009-9787-z
    By:
    • Eun-Jun Yoon;
    • Kee-Young Yoo;
    • Sang-Soo Yeo;
    • Lee, Changhoon
    Publication type:
    Article
    45
    46
    47
    48

    Lattice-based deniable ring signatures.

    Published in:
    International Journal of Information Security, 2019, v. 18, n. 3, p. 355, doi. 10.1007/s10207-018-0417-1
    By:
    • Gao, Wen;
    • Chen, Liqun;
    • Hu, Yupu;
    • Newton, Christopher J. P.;
    • Wang, Baocang;
    • Chen, Jiangshan
    Publication type:
    Article
    49
    50