Your search for 38215 returns 2665 document(s) |
Generalized key-evolving signature schemes or how to foil an armed adversary, (LNCS-Lecture Notes in Computer Science 2576) Hal 151-168 |
Author: Gene Itkis; Peng Xie; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On the security of two threshold signature schemes with traceable signers, (LNCS-Lecture Notes in Computer Science 2576) Hal 111-122 |
Author: Guilin Wang; Xiaoxi Han; Bo Zhu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
How to convert any digital signature scheme into a group signature scheme, (LNCS-Lecture Notes in Computer Science 1361) Hal 177-190 |
Author: Holger Petersen; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
On signature schemes with threshold verification detecting malicious verifiers, (LNCS-Lecture Notes in Computer Science 1361) Hal 67-78 |
Author: Holger Petersen; Markus Michels; | Call Number: 004.62 Chr s | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
How to repair ESIGN,(LNCS-Lecture Notes in Computer Science 2576) Hal 234-240 |
Author: Louis Granboulan; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A ring signature scheme based on the nyberg-rueppel signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 169-175 |
Author: Chong-zhi Gao; Zheng-an Yao; Lei Li; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A threshold GQ signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 137-150 |
Author: Li-Shan Liu; Cheng-Kang Chu; Wen-Guey Tzeng; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Equivocable and extractable commitment schemes, (LNCS-Lecture Notes in Computer Science 2576) Hal 74-87 |
Author: Giovanni Di Crescenzo; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Secret sharing schemes on access structures with intersection number equal to one (LNCS-Lecture Notes in Computer Science 2576) 354 |
Author: Jaume Marti-Farre; Carles Padro; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Intrusion-resilient signatures: generic constructions, or defeating strong adversary with minimal assumptions, (LNCS-Lecture Notes in Computer Science 2576) Hal 102-118 |
Author: Gene Itkis; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|