Your search for 38220 returns 2479 document(s) |
Improved algebraic traitor tracing scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 217-227 |
Author: Chunyan Bai; Guiliang Feng; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An improved secure indentity-based on-lined /off-lined signature scheme, (LNCS-Lecture Notes in Computer Science 5576) Hal. 588-597 |
Author: Jianghong Zhang; Yixian Yang; Xinxin Niu; Shengnam Gao; Hua Chen; Qin Geng; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A ring signature scheme based on the nyberg-rueppel signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 169-175 |
Author: Chong-zhi Gao; Zheng-an Yao; Lei Li; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An improved pseudorandom generator based on hardness of factoring, (LNCS-Lecture Notes in Computer Science 2576) Hal 88-101 |
Author: Nenad Dedic; Leonid Reyzin; Salil Vadhan; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Improved scalable hash chain traversal, (LNCS-Lecture Notes in Computer Science 2576) Hal 86-95 |
Author: Sung-Ryul Kim; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A group key distribution scheme with decentralised user join, (LNCS-Lecture Notes in Computer Science 2576) Hal 146-163 |
Author: Hartono Kurnio; Rei Safavi-Naini; Huaxiong Wang; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
An IP traceback scheme integrating DPM and PPM, (LNCS-Lecture Notes in Computer Science 2576) Hal 76-85 |
Author: Fan Min; Jun-yan Zhang; Guo-wie Yang; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
A threshold GQ signature scheme, (LNCS-Lecture Notes in Computer Science 2576) Hal 137-150 |
Author: Li-Shan Liu; Cheng-Kang Chu; Wen-Guey Tzeng; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Efficient distributed signcryption scheme as group signcryption, (LNCS-Lecture Notes in Computer Science 2576) Hal 403-417 |
Author: DongJin Kwak; SangJae Moon; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|
Multy-party Computation from any linear secret sharing scheme unconditionally secure againts adaptive adversary: the zero-error case, (LNCS-Lecture Notes in Computer Science 2576) Hal 1-15 |
Author: Ventzislav Nikov; Svetla Nikova; Bart Preneel; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
|
Find Similar |
Add To Favorites |
Detail in New Window
|