|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3636 occurrences of 1668 keywords
|
|
|
Results
Found 8730 publication records. Showing 8730 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
108 | Giuseppe Ateniese, Gene Tsudik |
Some Open Issues and New Directions in Group Signatures. |
Financial Cryptography |
1999 |
DBLP DOI BibTeX RDF |
Multi-Group Signatures, Sub-Group Signatures, Coalition Attacks, Digital Signatures, Public-key Cryptography, Group Signatures, Revocation |
89 | N. R. Sunitha, B. B. Amberker |
Forward-Secure Multi-signatures. |
ICDCIT |
2008 |
DBLP DOI BibTeX RDF |
Serial multi-signature, Parallel multi-signature, Digital Signature, Forward-Security, e-banking, ElGamal Signatures |
83 | Laila El Aimani |
Toward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based Signatures. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
Pairing-based signatures, Undeniable signatures, Generic construction |
80 | Sherman S. M. Chow |
Real Traceable Signatures. |
Selected Areas in Cryptography |
2009 |
DBLP DOI BibTeX RDF |
efficient tracing, anonymity management, group signatures, standard model, bilinear groups, traceable signatures |
79 | Brian J. Matt |
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures. |
Public Key Cryptography |
2009 |
DBLP DOI BibTeX RDF |
Pairing-based signatures, Wireless networks, Identity-based signatures, Short signatures, Batch verification |
75 | Sherman S. M. Chow, Willy Susilo |
Generic Construction of (Identity-Based) Perfect Concurrent Signatures. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
Perfect Ambiguity, Bilinear Pairing, Fair-Exchange, Ring Signatures, Identity-based Signatures, Concurrent Signatures |
72 | David Galindo, Javier Herranz, Eike Kiltz |
On the Generic Construction of Identity-Based Signatures with Additional Properties. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Yevgeniy Dodis, Leonid Reyzin |
Breaking and repairing optimistic fair exchange from PODC 2003. |
Digital Rights Management Workshop |
2003 |
DBLP DOI BibTeX RDF |
verifiably committed signatures, digital signatures, fair exchange, multisignatures, verifiably encrypted signatures |
70 | Eike Kiltz, Anton Mityagin, Saurabh Panjwani, Barath Raghavan |
Append-Only Signatures. |
ICALP |
2005 |
DBLP DOI BibTeX RDF |
Algebraic Signatures, Append-only Signatures, Hierarchical Identity-based Signatures |
69 | Fabien Laguillaumie, Damien Vergnaud |
Multi-designated Verifiers Signatures. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
multi-designated verifiers signatures, privacy of signers identity, bilinear maps, ring signatures, exact security |
69 | Song Han 0004, Elizabeth Chang 0001, Tharam S. Dillon, Jie Wang 0038 |
Improvement of a Convertible Undeniable Partially Blind Signature Scheme. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
Partially blind signature, Convertible undeniable signature, Security protocol, Blind signature, Undeniable signature |
67 | Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham |
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. |
EUROCRYPT |
2003 |
DBLP DOI BibTeX RDF |
|
67 | Rosario Gennaro, Hugo Krawczyk, Tal Rabin |
RSA-Based Undeniable Signatures. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
|
66 | Guilin Wang |
On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
threshold group signatures, threshold-multisignatures, digital signatures, group signatures |
66 | Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 |
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
Certificate-based, Security Models, Generic Construction, Certificateless |
64 | Seung Geol Choi, Kunsoo Park, Moti Yung |
Short Traceable Signatures Based on Bilinear Pairings. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
anonymity, cryptographic protocols, bilinear pairings, group signatures, traceable signatures |
64 | Eric Cronin, Sugih Jamin, Tal Malkin, Patrick D. McDaniel |
On the performance, feasibility, and use of forward-secure signatures. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
forward-secure signatures, digital signatures |
63 | Cheng-Kang Chu, Wen-Guey Tzeng |
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures. |
ACISP |
2007 |
DBLP DOI BibTeX RDF |
anonymous signatures, group signatures, ring signatures |
63 | Laila El Aimani |
On Generic Constructions of Designated Confirmer Signatures. |
INDOCRYPT |
2009 |
DBLP DOI BibTeX RDF |
Designated Confirmer signatures, Reduction/meta-reduction, Zero Knowledge, Generic construction |
63 | Yaling Zhang, Xiaofeng Wang |
Message Substitute Attack on Concurrent Signatures Protocol and its Improvement. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
Message Substitute Attack, Concurrent Signatures |
63 | Fabien Laguillaumie, Damien Vergnaud |
Time-Selective Convertible Undeniable Signatures. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
Convertible undeniable signatures, time-selective conversion, anonymity, bilinear maps, exact security |
62 | Khanh Nguyen |
Asymmetric Concurrent Signatures. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Yuh-Dauh Lyuu, Ming-Luen Wu |
Convertible Group Undeniable Signatures. |
ICISC |
2002 |
DBLP DOI BibTeX RDF |
|
60 | Tal Malkin, Satoshi Obana, Moti Yung |
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
59 | Aashish Srivastava |
Electronic signatures: a brief review of the literature. |
ICEC |
2006 |
DBLP DOI BibTeX RDF |
lack of acceptance, security, complexity, digital signatures, cost, legislation, electronic signatures, liability |
59 | Steven D. Galbraith, Wenbo Mao |
Invisibility and Anonymity of Undeniable and Confirmer Signatures. |
CT-RSA |
2003 |
DBLP DOI BibTeX RDF |
confirmer signatures, anonymity, RSA, Undeniable signatures, invisibility |
57 | Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier 0001, René Rietz |
Systematic Signature Engineering by Re-use of Snort Signatures. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
57 | David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong Song |
Creating Vulnerability Signatures Using Weakest Preconditions. |
CSF |
2007 |
DBLP DOI BibTeX RDF |
|
57 | Tatsuaki Okamoto |
Efficient Blind and Partially Blind Signatures Without Random Oracles. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Huafei Zhu, Feng Bao 0001 |
More on Stand-Alone and Setup-Free Verifiably Committed Signatures. |
ACISP |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Liqun Chen 0002, Caroline Kudla, Kenneth G. Paterson |
Concurrent Signatures. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
56 | Patrick W. Brown |
Digital Signatures: Can They be Accepted as Legal Signatures in EDI? |
CCS |
1993 |
DBLP DOI BibTeX RDF |
distributed systems, cryptography, digital signatures, law, EDI |
56 | Hossein Ghodosi, Josef Pieprzyk |
Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
Cryptography, Digital Signatures, Proxy Signatures, ElGamal signatures |
53 | Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 |
Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. |
WISA |
2007 |
DBLP DOI BibTeX RDF |
Security models, Proxy signatures, Undeniable signatures, Security proof, Convertible |
53 | Mohamed Al-Ibrahim, Anton Cerný |
Proxy and Threshold One-Time Signatures. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
digital signatures, group signatures, proxy signature, threshold cryptography, broadcast authentication, One-time signature |
53 | Steven D. Galbraith, Wenbo Mao, Kenneth G. Paterson |
RSA-Based Undeniable Signatures for General Moduli. |
CT-RSA |
2002 |
DBLP DOI BibTeX RDF |
RSA-based Undeniable Signatures, Undeniable Signatures |
52 | Alberto Avritzer, Rajanikanth Tanikella, Kiran James, Robert G. Cole, Elaine J. Weyuker |
Monitoring for security intrusion using performance signatures. |
WOSP/SIPEW |
2010 |
DBLP DOI BibTeX RDF |
performance signatures, security, measurement, monitoring |
52 | Sebastian Schmerl, Michael Vogel, Hartmut König |
Identifying Modeling Errors in Signatures by Model Checking. |
SPIN |
2009 |
DBLP DOI BibTeX RDF |
Attack Signatures, Intrusion Detection, Computer Security, Signature Verification, Misuse Detection, Promela, Spin model checker |
52 | Xiaofeng Chen 0001, Fangguo Zhang, Yi Mu 0001, Willy Susilo |
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. |
Financial Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Bilinear pairings, Electronic cash, Restrictive partially blind signatures |
52 | Parminder Chhabra, Ajita John, Huzur Saran |
PISA: Automatic Extraction of Traffic Signatures. |
NETWORKING |
2005 |
DBLP DOI BibTeX RDF |
Traffic Clusters, Security, Signatures, Worms, DDoS |
52 | Simon So, Clement H. C. Leung |
A New Paradigm in Image Indexing and Retrieval Using Composite Bitplane Signatures. |
ICMCS, Vol. 1 |
1999 |
DBLP DOI BibTeX RDF |
Composite Bitplane Signatures, Visual Information Systems, Multimedia Databases, Image Indexing and Retrieval |
52 | Fabien Laguillaumie, Damien Vergnaud |
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures. |
ISC |
2007 |
DBLP DOI BibTeX RDF |
Universal designated verifier signatures, zero-knowledge proof, Elgamal signatures |
51 | Guilin Wang, Feng Bao 0001, Jianying Zhou 0001 |
The Fairness of Perfect Concurrent Signatures. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
security protocol, fair exchange, Concurrent signature |
51 | Fabien Laguillaumie, Pascal Paillier, Damien Vergnaud |
Universally Convertible Directed Signatures. |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Johannes Buchmann 0001, Luis Carlos Coronado García, Erik Dahmen, Martin Döring, Elena Klintsevich |
CMSS - An Improved Merkle Signature Scheme. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
Java Cryptography Architecture, Post-Quantum Signatures, Tree Authentication, One-Time-Signatures, Merkle Signatures |
50 | Susan K. Langford |
Weakness in Some Threshold Cryptosystems. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signatures, secret sharing, undeniable signatures, threshold signatures, Threshold Cryptosystems |
50 | Jan-Hendrik Evertse, Eugène van Heyst |
Which new RSA Signatures can be Computed from RSA Signatures, Obtained in a Specific Interactive Protocol? |
EUROCRYPT |
1992 |
DBLP DOI BibTeX RDF |
|
49 | Yongjun Jin |
Driving off a tiger, but leading a wolf: a review of the Chinese contract law art.11. |
ICEC |
2005 |
DBLP DOI BibTeX RDF |
data message, writing form, signatures, electronic signatures |
48 | Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier 0001 |
Simplifying Signature Engineering by Reuse. |
ETRICS |
2006 |
DBLP DOI BibTeX RDF |
Attack Signatures, Intrusion Detection, Computer Security, Misuse Detection |
48 | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini |
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Laurie Law, Brian J. Matt |
Finding Invalid Signatures in Pairing-Based Batches. |
IMACC |
2007 |
DBLP DOI BibTeX RDF |
Pairing-based signatures, ID-based signatures, Batch verification |
48 | Jing Xu 0002, Zhenfeng Zhang, Dengguo Feng |
ID-Based Aggregate Signatures from Bilinear Pairings. |
CANS |
2005 |
DBLP DOI BibTeX RDF |
bilinear pairings, ID-based signatures, aggregate signatures |
48 | Shaobin Wang, Fan Hong, Xian Zhu |
Optimistic Fair-exchange Protocols Based on DSA Signatures. |
IEEE SCC |
2004 |
DBLP DOI BibTeX RDF |
DSA signatures, E-commerce, multi-signatures, Fair-exchange protocols |
48 | Masayuki Abe, Tatsuaki Okamoto |
Provably Secure Partially Blind Signatures. |
CRYPTO |
2000 |
DBLP DOI BibTeX RDF |
Partially Blind Signatures, Blind Signatures, Witness Indistinguishability |
48 | Martin Leu |
Relative Signatures for Fault Tolerance and their Implementation. |
EDCC |
1994 |
DBLP DOI BibTeX RDF |
relative signatures, relative authentication, fault tolerance, distributed systems, authentication, digital signatures |
47 | Benoît Libert, Jean-Jacques Quisquater |
Practical Time Capsule Signatures in the Standard Model from Bilinear Maps. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
time capsule signatures, standard model, bilinear maps |
47 | Huafei Zhu, Willy Susilo, Yi Mu 0001 |
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
setup-free, stand-alone, verifiably committed signatures, multi-party |
47 | HyoJin Yoon, Jung Hee Cheon, Yongdae Kim |
Batch Verifications with ID-Based Signatures. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
ID-based signatures, Batch verifications |
47 | David Naccache, David Pointcheval, Christophe Tymen |
Monotone Signatures. |
Financial Cryptography |
2001 |
DBLP BibTeX RDF |
Bank Notes, ID Cards, Digital Signatures, Coercion |
47 | Man Ho Au, Willy Susilo, Yi Mu 0001 |
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
on-line/off-line signatures, divisible on-line/off-line signatures, OS-EU-CMA, DOS-EU-CMA |
47 | Laurence Bull, Peter Stañski, David Squire |
Content extraction signatures using XML digital signatures and custom transforms on-demand. |
WWW |
2003 |
DBLP DOI BibTeX RDF |
Net framework XML signature API, XML signature custom transforms, content extraction signatures, XML signatures, dynamic signature verification |
46 | Chuankun Wu |
Set signatures and their applications. |
Sci. China Ser. F Inf. Sci. |
2009 |
DBLP DOI BibTeX RDF |
set signature, cryptography, forward security |
46 | David Brumley, James Newsome, Dawn Song, Hao Wang, Somesh Jha |
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures. |
IEEE Trans. Dependable Secur. Comput. |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Dario Catalano, Mario Di Raimondo, Dario Fiore 0001, Rosario Gennaro |
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen |
Batch Verification of Short Signatures. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Wei Wu 0001 |
A Generic Construction for Universally-Convertible Undeniable Signatures. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
Universally-Convertible, Provable Security, Undeniable Signature, Generic Construction |
46 | Willy Susilo, Yi Mu 0001 |
On the Security of Nominative Signatures. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Aggelos Kiayias, Yiannis Tsiounis, Moti Yung |
Traceable Signatures. |
EUROCRYPT |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Antonio Mana, Sonia Matamoros |
Practical Mobile Digital Signatures. |
EC-Web |
2002 |
DBLP DOI BibTeX RDF |
|
46 | Chin-Seng Chua, Ray Jarvis |
Point Signatures: A New Representation for 3D Object Recognition. |
Int. J. Comput. Vis. |
1997 |
DBLP DOI BibTeX RDF |
model indexing, free-form surface registrataion, feature extraction, pose estimation, 3D object recognition |
44 | Taek-Young Youn, Young-Ho Park 0001, Chang Han Kim, Jongin Lim 0001 |
An Efficient ID-Based Delegation Network. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
Delegation Network, Proxy Signatures, ID-based Signatures |
44 | Lan Nguyen |
Accumulators from Bilinear Pairings and Applications. |
CT-RSA |
2005 |
DBLP DOI BibTeX RDF |
membership revocation, privacy, anonymity, group signatures, ring signatures, ID-based, identity escrow, Dynamic accumulators |
44 | Nicolas T. Courtois |
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
MinRank problem, rank-distance codes, syndrome decoding (SD), identification, NP-complete problems, group signatures, Zero-knowledge, ring signatures, multivariate cryptography, entity authentication |
44 | Marc Joye, Narn-Yih Lee, Tzonelih Hwang |
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives. |
ISW |
1999 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Digital signatures, Group signatures |
43 | Manoj K. Agarwal, Narendran Sachindran, Manish Gupta 0007, Vijay Mann |
Fast Extraction of Adaptive Change Point Based Patterns for Problem Resolution in Enterprise Systems. |
DSOM |
2006 |
DBLP DOI BibTeX RDF |
problem signatures, change point detection, patterns, fault localization, adaptive learning |
43 | Laurence Bull, David McG. Squire, Yuliang Zheng 0001 |
A Hierarchical Extraction Policy for content extraction signatures: Selectively handling verifiable digital content. |
Int. J. Digit. Libr. |
2004 |
DBLP DOI BibTeX RDF |
Content extraction signatures, XML Signature custom transforms, Selective content disclosure, Hierarchical Extraction Policy, Privacy-enhancing signatures |
43 | Guilin Wang, Feng Bao 0001, Jianying Zhou 0001, Robert H. Deng |
Security Analysis of Some Proxy Signatures. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
Digital signatures, security analysis, proxy signatures |
43 | Mihir Bellare, Gregory Neven |
Transitive Signatures Based on Factoring and RSA. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
transitive signatures, RSA, Signatures |
43 | Manoj Franklin |
Fast computation of C-MISR signatures. |
Asian Test Symposium |
1995 |
DBLP DOI BibTeX RDF |
C-MISR signatures, built-in self-test applications, good circuit signature, faulty circuit signatures, cellular automata-based multi-input signature registers, equivalent single input circuit, VLSI, logic testing, built-in self test, cellular automata, integrated circuit testing, sequential circuits, shift registers, test responses, signature analyzers, equivalent circuits |
42 | Anna Lisa Ferrara, Matthew Green 0001, Susan Hohenberger, Michael Østergaard Pedersen |
Practical Short Signature Batch Verification. |
CT-RSA |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Qianhong Wu, Xiaofeng Chen 0001, Changjie Wang, Yumin Wang |
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Hong Han 0003, Xianliang Lu, Jun Lu, Bo Chen, Ren Li Yong |
Data mining aided signature discovery in network-based intrusion detection system. |
ACM SIGOPS Oper. Syst. Rev. |
2002 |
DBLP DOI BibTeX RDF |
network-based intrusion detection, signature discovery, data mining, intrusion detection system |
42 | Ivan Damgård, Torben P. Pedersen |
New Convertible Undeniable Signature Schemes. |
EUROCRYPT |
1996 |
DBLP DOI BibTeX RDF |
|
42 | Benoît Libert, Moti Yung |
Dynamic fully forward-secure group signatures. |
AsiaCCS |
2010 |
DBLP DOI BibTeX RDF |
key protection, anonymity, security modeling, group signatures, forward security, key exposure |
42 | Benoît Libert, Moti Yung |
Efficient Traceable Signatures in the Standard Model. |
Pairing |
2009 |
DBLP DOI BibTeX RDF |
anonymity, standard model, Traceable signatures |
42 | Kent Griffin, Scott Schneider 0002, Xin Hu 0001, Tzi-cker Chiueh |
Automatic Generation of String Signatures for Malware Detection. |
RAID |
2009 |
DBLP DOI BibTeX RDF |
malware signatures, library function identification, diversity-based heuristics, Markov model, signature generation |
42 | Rui Zhang 0002, Hideki Imai |
Strong Anonymous Signatures. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
anonymity, digital signatures |
42 | Jacob C. N. Schuldt, Kanta Matsuura, Kenneth G. Paterson |
Proxy Signatures Secure Against Proxy Key Exposure. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
provable security, proxy signatures |
42 | Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 |
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Provable Security, Undeniable Signatures, Identity-based, Convertible |
42 | Emeline Hufschmitt, Jacques Traoré |
Fair Blind Signatures Revisited. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
Security Model, electronic voting, Blind signatures, Anonymity Revocation |
42 | Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters |
Forward-secure signatures with untrusted update. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
untrusted storage, digital signatures, forward security, two-factor authentication |
42 | Benoît Libert, Jean-Jacques Quisquater, Moti Yung |
Efficient Intrusion-Resilient Signatures Without Random Oracles. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
Intrusion-resilience, signatures, standard model, pairings |
42 | Patrick Haffner, Subhabrata Sen, Oliver Spatscheck, Dongmei Wang |
ACAS: automated construction of application signatures. |
MineNet |
2005 |
DBLP DOI BibTeX RDF |
application signatures, application-level filter, machine learning |
42 | Seung-Taek Park, David M. Pennock, C. Lee Giles, Robert Krovetz |
Analysis of lexical signatures for improving information persistence on the World Wide Web. |
ACM Trans. Inf. Syst. |
2004 |
DBLP DOI BibTeX RDF |
Broken URLs, dead links, lexical signatures, robust hyperlinks, information retrieval, World Wide Web, digital libraries, indexing, search engines, TREC, inverse document frequency, term frequency |
42 | Dan Boneh, Hovav Shacham |
Group signatures with verifier-local revocation. |
CCS |
2004 |
DBLP DOI BibTeX RDF |
trusted computing, group signatures, revocation |
42 | Robin Sommer, Vern Paxson |
Enhancing byte-level network intrusion detection signatures with context. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
bro, security, evaluation, pattern matching, signatures, network intrusion detection, snort |
42 | Juan A. Garay, Carl Pomerance |
Timed Fair Exchange of Standard Signatures: [Extended Abstract]. |
Financial Cryptography |
2003 |
DBLP DOI BibTeX RDF |
Timed-release cryptography, timed commitments, blind signatures, contract signing |
42 | Seung-Taek Park, David M. Pennock, C. Lee Giles, Robert Krovetz |
Analysis of lexical signatures for finding lost or related documents. |
SIGIR |
2002 |
DBLP DOI BibTeX RDF |
broken URLs, dead links, lexical signatures, robust hyperlinks, information retrieval, world wide web, indexing, search engines, libraries, digital, TREC, inverse document frequency, term frequency |
42 | Anna Lysyanskaya |
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
Unique signatures, verifiable random functions, application of groups with DH-DDH separation |
41 | Kristian Gjøsteen, Lillian Kråkmo |
Round-Optimal Blind Signatures from Waters Signatures. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
Waters signatures, Blind signatures |
Displaying result #1 - #100 of 8730 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|