Works matching DE "THRESHOLD signatures"
Results: 15
Improved PBFT protocol based on phase voting and threshold signature.
- Published in:
- Journal of Southeast University (English Edition), 2022, v. 38, n. 3, p. 213, doi. 10.3969/j.issn.1003-7985.2022.03.001
- By:
- Publication type:
- Article
Interference alignment in overlay cognitive radio femtocell networks.
- Published in:
- IET Communications (Wiley-Blackwell), 2016, v. 10, n. 11, p. 1401, doi. 10.1049/iet-com.2015.0690
- By:
- Publication type:
- Article
Faulty Instantiations of Threshold Ring Signature from Threshold Proof-of-Knowledge Protocol.
- Published in:
- Computer Journal, 2016, v. 59, n. 7, p. 945, doi. 10.1093/comjnl/bxv098
- By:
- Publication type:
- Article
Non-Interactive Forward-Secure Threshold Signature without Random Oracles.
- Published in:
- Journal of Information Science & Engineering, 2012, v. 28, n. 3, p. 571
- By:
- Publication type:
- Article
A SM2 Elliptic Curve Threshold Signature Scheme without a Trusted Center.
- Published in:
- KSII Transactions on Internet & Information Systems, 2016, v. 10, n. 2, p. 897, doi. 10.3837/tiis.2016.02.025
- By:
- Publication type:
- Article
SCHNORR RING SIGNATURE SCHEME WITH DESIGNATED REVOCABILITY.
- Published in:
- Intelligent Automation & Soft Computing, 2012, v. 18, n. 6, p. 739, doi. 10.1080/10798587.2012.10643284
- By:
- Publication type:
- Article
Simulatable and secure certificate-based threshold signature without pairings.
- Published in:
- Security & Communication Networks, 2014, v. 7, n. 11, p. 2094, doi. 10.1002/sec.921
- By:
- Publication type:
- Article
Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes Impossibility of finding any third family of server protocols integrating Byzantine quorum systems with threshold signature schemes
- Published in:
- Security & Communication Networks, 2013, v. 6, n. 5, p. 612, doi. 10.1002/sec.593
- By:
- Publication type:
- Article
GOTHiC, a probabilistic model to resolve complex biases and to identify real interactions in Hi-C data.
- Published in:
- PLoS ONE, 2017, v. 12, n. 4, p. 1, doi. 10.1371/journal.pone.0174744
- By:
- Publication type:
- Article
ID-based, Proxy, Threshold Signature Scheme.
- Published in:
- International Journal of Electronics & Telecommunications, 2021, v. 67, n. 2, p. 201, doi. 10.24425/ijet.2021.135965
- By:
- Publication type:
- Article
High-dimension space projection-based biometric encryption for fingerprint with fuzzy minutia.
- Published in:
- Soft Computing - A Fusion of Foundations, Methodologies & Applications, 2016, v. 20, n. 12, p. 4907, doi. 10.1007/s00500-015-1778-2
- By:
- Publication type:
- Article
Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results.
- Published in:
- International Journal of Information Security, 2013, v. 12, n. 6, p. 439, doi. 10.1007/s10207-013-0200-2
- By:
- Publication type:
- Article
Leveraging irrevocability to deal with signature saturation in hardware transactional memory.
- Published in:
- Journal of Supercomputing, 2017, v. 73, n. 6, p. 2525, doi. 10.1007/s11227-016-1944-z
- By:
- Publication type:
- Article
Secure proxy signature schemes from the Weil pairing.
- Published in:
- Journal of Supercomputing, 2013, v. 65, n. 2, p. 496, doi. 10.1007/s11227-012-0760-3
- By:
- Publication type:
- Article
Analysis and Design of Protocol for Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers.
- Published in:
- Wireless Personal Communications, 2015, v. 80, n. 3, p. 1281, doi. 10.1007/s11277-014-2087-2
- By:
- Publication type:
- Article