Your search for 38213 returns 2341 document(s) |
Proxy and threshold one-time signatures, (LNCS-Lecture Notes in Computer Science 2576) Hal 123-136 |
Author: Mohamed Al-Ibrahim; Anton Cerny; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Forward-secure signatures with fast key update, (LNCS-Lecture Notes in Computer Science 2576) Hal 241-256 |
Author: Anton Kozlov; Leonid Reyzin; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the security of two threshold signature schemes with traceable signers, (LNCS-Lecture Notes in Computer Science 2576) Hal 111-122 |
Author: Guilin Wang; Xiaoxi Han; Bo Zhu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A threshold GQ signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 137-150 |
Author: Li-Shan Liu; Cheng-Kang Chu; Wen-Guey Tzeng; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Intrusion-resilient signatures: generic constructions, or defeating strong adversary with minimal assumptions, (LNCS-Lecture Notes in Computer Science 2576) Hal 102-118 |
Author: Gene Itkis; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Round optimal distributed key generation of threshold cryptosystem based on discrete logarithm problem, (LNCS-Lecture Notes in Computer Science 2576) Hal 96-110 |
Author: Rui Zhang; Hideki Imai; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Threshold and bounded-delay voting in critical control systems, ((LNCS-Lecture Notes in Computer Science 1926) Hal 70-81 |
Author: Paul Caspi; Rym Salem; | Call Number: 004.33 Jos f | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On signature schemes with threshold verification detecting malicious verifiers, (LNCS-Lecture Notes in Computer Science 1361) Hal 67-78 |
Author: Holger Petersen; Markus Michels; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Threshold key-recovery systems for RSA, (LNCS-Lecture Notes in Computer Science 1361) Hal 191-200 |
Author: Tatsuaki Okamoto; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
The split-proxy approach: a new architecture for parallel video servers, (LNCS-Lecture Notes in Computer Science 1557) Hal 327-336 |
Author: Giuseppe De Pietro; Marco Lerro; | Call Number: 004.35 Par | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|