|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5777 occurrences of 2201 keywords
|
|
|
Results
Found 13353 publication records. Showing 13353 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
102 | Yangjun Chen |
On the General Signature Trees. |
DEXA |
2005 |
DBLP DOI BibTeX RDF |
signature identifier, signature tree, information retrieval, index, signature file |
88 | Huaqun Wang, Futai Zhang, Yanfei Sun |
Cryptanalysis of a Generalized Ring Signature Scheme. |
IEEE Trans. Dependable Secur. Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
88 | Song Han 0004, Elizabeth Chang 0001, Tharam S. Dillon, Jie Wang 0038 |
Improvement of a Convertible Undeniable Partially Blind Signature Scheme. |
AINA (1) |
2006 |
DBLP DOI BibTeX RDF |
Partially blind signature, Convertible undeniable signature, Security protocol, Blind signature, Undeniable signature |
85 | Byoungcheon Lee, Kwangjo Kim |
Self-certified Signatures. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
self-certified signature, self-certified key, multi-certification signature, privilege management infrastructure, digital signature, public key infrastructure |
84 | Dae Hyun Yum, Pil Joong Lee |
Generic Construction of Certificateless Signature. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
public-key signature, identity-based signature, Certificateless signature |
78 | Jian Ren 0001, Lein Harn |
Ring Signature Based on ElGamal Signature. |
WASA |
2006 |
DBLP DOI BibTeX RDF |
|
76 | Ronald L. Rivest, Adi Shamir, Yael Tauman |
How to Leak a Secret. |
ASIACRYPT |
2001 |
DBLP DOI BibTeX RDF |
ring signature scheme, signer-ambiguous signature scheme, designated verifier signature scheme, signature scheme, group signature scheme |
75 | Yung-Yuan Chen |
Concurrent Detection of Control Flow Errors by Hybrid Signature Monitoring. |
IEEE Trans. Computers |
2005 |
DBLP DOI BibTeX RDF |
error-detection latency, Concurrent error detection, signature scheme, watchdog processor, error-detection coverage |
75 | Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun |
Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05. |
Inscrypt |
2006 |
DBLP DOI BibTeX RDF |
bilinear pairing, group signature, ID-based cryptography, verifiably encrypted signature |
75 | Dae Hyun Yum, Pil Joong Lee |
Efficient Key Updating Signature Schemes Based on IBS. |
IMACC |
2003 |
DBLP DOI BibTeX RDF |
Key insulated signature, intrusion resilient siganture, identity based signature |
75 | Yumin Yuan |
A Threshold Proxy Signature Scheme with Nonrepudiation and Anonymity. |
ISCIS |
2006 |
DBLP DOI BibTeX RDF |
threshold proxy signature, anonymity, Digital signature, proxy signature, nonrepudiation |
75 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
Short (Identity-Based) Strong Designated Verifier Signature Schemes. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
strong designated verifier signature scheme, random oracle model, short signature, identity based, designated verifier signature |
75 | Marc Joye, Hung-Mei Lin |
On the TYS Signature Scheme. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
TYS signature scheme, Camenisch-Lysyanskaya signature scheme, Cryptography, digital signature, standard model |
70 | Sung-Hyun Yun, Hyung-Woo Lee |
The Efficient Multipurpose Convertible Undeniable Signature Scheme. |
KES (3) |
2005 |
DBLP DOI BibTeX RDF |
|
70 | Yung-Yuan Chen |
Concurrent Detection of Processor Control Errors by Hybrid Signature Monitoring. |
EDCC |
1999 |
DBLP DOI BibTeX RDF |
|
70 | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow |
Two Improved Partially Blind Signature Schemes from Bilinear Pairings. |
ACISP |
2005 |
DBLP DOI BibTeX RDF |
threshold partially blind signature, identity-based partially blind signature, bilinear pairings |
70 | Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka |
Sanitizable and Deletable Signature. |
WISA |
2008 |
DBLP DOI BibTeX RDF |
sanitizable signature, deletable signature, Digital signature, aggregate signature |
69 | Zhengjun Cao, Mulan Liu |
Classification of signature-only signature models. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
signature-only signature, signing party, verifying party, lucidity of a message’s content, method of producing Pk, consequence of updating Sk |
67 | Emeline Hufschmitt, Jacques Traoré |
Fair Blind Signatures Revisited. |
Pairing |
2007 |
DBLP DOI BibTeX RDF |
Security Model, electronic voting, Blind signatures, Anonymity Revocation |
67 | Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto |
Efficient ID-Based Digital Signatures with Message Recovery. |
CANS |
2007 |
DBLP DOI BibTeX RDF |
k-BDHI problem, pairing, short signature, ID-based signature, message recovery |
66 | Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim |
Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001. |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
Trace Projection, LFSR, digital signature scheme, XTR |
66 | Harish Srinivasan, Sargur N. Srihari, Matthew J. Beal |
Machine Learning for Signature Verification. |
ICVGIP |
2006 |
DBLP DOI BibTeX RDF |
forensic signature examination, digital document processing, machine learning, biometrics, signature verification |
66 | Haifeng Qian, Zhenfu Cao |
A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme. |
ISPA Workshops |
2005 |
DBLP DOI BibTeX RDF |
RSA, provably secure, random oracle model, proxy signature, identity-based signature |
66 | Guilin Wang, Xiaoxi Han, Bo Zhu |
On the Security of Two Threshold Signature Schemes with Traceable Signers. |
ACNS |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signature, threshold signature |
66 | Byoungcheon Lee, Heesun Kim, Kwangjo Kim |
Secure Mobile Agent Using Strong Non-designated Proxy Signature. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
Secure mobile agent, strong non-designated proxy signature, multi-proxy signature |
66 | Rongxing Lu, Xiaolei Dong, Zhenfu Cao |
Designing efficient proxy signature schemes for mobile communication. |
Sci. China Ser. F Inf. Sci. |
2008 |
DBLP DOI BibTeX RDF |
proxy protected signature, proxy aggregate signature, efficiency, provable secure, bilinear pairings, proxy signature |
66 | N. R. Sunitha, B. B. Amberker |
Proxy Re-signature Schemes. |
ICISS |
2008 |
DBLP DOI BibTeX RDF |
Signature conversion, Proxy re-signature, Proxy revocation, Proxy key, Proxy Signature |
66 | Chunguang Ma, Peng Wu, Guochang Gu |
A New Method for the Design of Stateless Transitive Signature Schemes. |
APWeb Workshops |
2006 |
DBLP DOI BibTeX RDF |
stateless signature, transitive signature, Cryptography, digital signature |
65 | Fangguo Zhang, Kwangjo Kim |
Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
Bilinear pairings, Proxy signature, Blind signature, ID-based cryptography |
63 | Jian Ren 0001, Lein Harn |
Generalized Ring Signatures. |
IEEE Trans. Dependable Secur. Comput. |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Jin Li 0002, Yuen-Yan Chan, Yanming Wang |
A Generic Construction of Secure Signatures Without Random Oracles. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
Weak Chosen Message Attack, Signature, Standard Model |
63 | Sherman S. M. Chow, Zhengjun Cao, Joseph K. Liu |
Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
secret sharing, bilinear pairings, Group signature, signcryption, proxy signature, identity-based signature |
62 | Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee 0001, Jong In Lim 0001 |
Digital Signature Schemes with Restriction on Signing Capability. |
ACISP |
2003 |
DBLP DOI BibTeX RDF |
|
62 | Jianhong Zhang, Yixian Yang, Xinxin Niu |
Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle. |
ISNN (3) |
2009 |
DBLP DOI BibTeX RDF |
Directed signature, CDH problem, DBDH problem, Standard model, ID-based |
62 | Mingwen Wang, Qingxin Zhu, Li Qing |
A Robust Coalition-Resistant Threshold Signature Scheme with Anonymous Signers. |
ISPA Workshops |
2005 |
DBLP DOI BibTeX RDF |
group scheme, coalition attack, robust scheme, digital signature, threshold scheme |
62 | Wei Zhao, Changlu Lin, Dingfeng Ye |
Provably Secure Convertible Nominative Signature Scheme. |
Inscrypt |
2008 |
DBLP DOI BibTeX RDF |
Nominative signature, Digital signature, Selectively, Universally, Convertible |
62 | Dennis Y. W. Liu, Joseph K. Liu, Yi Mu 0001, Willy Susilo, Duncan S. Wong |
Revocable Ring Signature. |
J. Comput. Sci. Technol. |
2007 |
DBLP DOI BibTeX RDF |
anonymity, group signature, revocability, ring signature |
62 | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Identity Based Threshold Ring Signature. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
Threshold ring signature, spontaneity, anonymity, bilinear pairings, identity-based signature |
61 | Joseph K. Liu, Willy Susilo, Duncan S. Wong |
Ring Signature with Designated Linkability. |
IWSEC |
2006 |
DBLP DOI BibTeX RDF |
linkable ring signature, spontaneous group signature, ring signature |
61 | Christophe Giraud 0001, Erik Woodward Knudsen |
Fault Attacks on Signature Schemes. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
XTR-DSA, Schnorr signature, Side-Channel Attack, Smartcard, Fault Attack, Signature schemes, DSA, ECDSA, ElGamal signature |
61 | Seungjoo Kim, Dongho Won |
Threshold Entrusted Undeniable Signature. |
ICISC |
2004 |
DBLP DOI BibTeX RDF |
Entrusted undeniable signature, Undeniable signature, Threshold signature |
60 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). |
ASIACRYPT |
2005 |
DBLP DOI BibTeX RDF |
|
60 | Adam L. Young, Moti Yung |
Towards Signature-Only Signature Schemes. |
ASIACRYPT |
2000 |
DBLP DOI BibTeX RDF |
Public Key Cryptosystems (PKCS), nested trapdoor, abuse freeness, (subliminal) leakage, design validation proofs, FIPS, digital signature, decryption, Public Key Infrastructure (PKI), NIST |
60 | Fangguo Zhang, Kwangjo Kim |
ID-Based Blind Signature and Ring Signature from Pairings. |
ASIACRYPT |
2002 |
DBLP DOI BibTeX RDF |
Provably security, Bilinear pairings, Blind signature, Ring signature, ID-based cryptography |
58 | Wei Gao 0007, Guilin Wang, Xueli Wang, Dongqing Xie |
Controllable Ring Signatures. |
WISA |
2006 |
DBLP DOI BibTeX RDF |
|
58 | Isamu Teranishi, Takuro Oyama, Wakaha Ogata |
General Conversion for Obtaining Strongly Existentially Unforgeable Signatures. |
INDOCRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
58 | Qiong Huang 0001, Duncan S. Wong, Jin Li 0002, Yiming Zhao |
Generic Transformation from Weakly to Strongly Unforgeable Signatures. |
J. Comput. Sci. Technol. |
2008 |
DBLP DOI BibTeX RDF |
weak unforgeability, signature, one-time signature, strong unforgeability |
58 | N. R. Sunitha, B. B. Amberker |
Forward-Secure Multi-signatures. |
ICDCIT |
2008 |
DBLP DOI BibTeX RDF |
Serial multi-signature, Parallel multi-signature, Digital Signature, Forward-Security, e-banking, ElGamal Signatures |
58 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
1-out-of-. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
1-out-of-n signature, oblivious signature, Schnorr signature, oblivious transfer |
57 | Jianhong Zhang, Qin Geng |
An Efficient Proxy Signature Scheme with Full-delegation. |
ICNSC |
2008 |
DBLP DOI BibTeX RDF |
|
57 | Young-Seol Kim, Jik-Hyun Chang |
Provably Secure Proxy Blind Signature Scheme. |
ISM |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Toru Nakanishi 0001, Nobuo Funabiki |
A short anonymously revocable group signature scheme from decision linear assumption. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
anonymity, group signature, revocation |
57 | Ping Yu 0006, Stephen R. Tate |
Online/Offline Signature Schemes for Devices with Limited Computing Capabilities. |
CT-RSA |
2008 |
DBLP DOI BibTeX RDF |
Online/Offline Signing, Devices with Limited Computing Capabilities, Digital Signature, Standard Model, Strong RSA Assumption |
57 | Adi Shamir, Yael Tauman |
Improved Online/Offline Signature Schemes. |
CRYPTO |
2001 |
DBLP DOI BibTeX RDF |
on-line/off-line, trapdoor hash functions, signature schemes |
57 | Zhenfu Cao, Haojin Zhu, Rongxing Lu |
Provably secure robust threshold partial blind signature. |
Sci. China Ser. F Inf. Sci. |
2006 |
DBLP DOI BibTeX RDF |
improved RSA cryptosystem, factoring problem, blind signature, electronic cash, threshold signature |
57 | Yangjun Chen, Yibin Chen |
On the Signature Tree Construction and Analysis. |
IEEE Trans. Knowl. Data Eng. |
2006 |
DBLP DOI BibTeX RDF |
bit-slice files, S-trees, signature trees, information retrieval, Signature files |
57 | He Ge, Stephen R. Tate |
Traceable Signature: Better Efficiency and Beyond. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
Variable Anonymity, Cryptographic Protocol, Group signature, Anonymous Authentication, Traceable Signature |
57 | Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Identity Based Ring Signature: Why, How and What Next. |
EuroPKI |
2005 |
DBLP DOI BibTeX RDF |
spontaneous anonymous group signature, bilinear pairings, PKI, Identity based cryptography, ring signature |
57 | Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Fangguo Zhang, Xiaofeng Chen 0001 |
A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. |
EUC Workshops |
2005 |
DBLP DOI BibTeX RDF |
Authentication, Proxy Signature, Short Signature |
57 | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow |
Secure Hierarchical Identity Based Signature and Its Application. |
ICICS |
2004 |
DBLP DOI BibTeX RDF |
Hierarchical identity-based signature, forward-secure signature, bilinear pairings |
57 | Guilin Wang, Feng Bao 0001, Jianying Zhou 0001, Robert H. Deng |
Security Remarks on a Group Signature Scheme with Member Deletion. |
ICICS |
2003 |
DBLP DOI BibTeX RDF |
member deletion, Digital signature, group signature |
57 | Adrian Perrig |
The BiBa one-time signature and broadcast authentication protocol. |
CCS |
2001 |
DBLP DOI BibTeX RDF |
signature based on a one-way function without trapdoor, source authentication for multicast, broadcast authentication, one-time signature |
57 | Brigitte Wirtz |
Stroke-based time warping for signature verification. |
ICDAR |
1995 |
DBLP DOI BibTeX RDF |
stroke-based time warping, function-based signature verification, positional data, 3D nonlinear correlation, signature signals, stroke index, DP index, finite state automaton, reference strokes, dynamic programming, dynamic programming, handwriting recognition, image matching, finite automata, authorisation, correlation methods, pressure, dynamic data, dynamic signature verification |
57 | Ke Han, Ishwar K. Sethi |
Signature identification via local association of features. |
ICDAR |
1995 |
DBLP DOI BibTeX RDF |
signature identification, local association of features, automatic search, signature database, finite symbols, local associative indexing, performance, feature extraction, indexing, handwriting recognition, image matching, image matching, software performance evaluation, search problems, visual databases, authorisation, strings, signature verification, geometric features, spatial distribution, topologic features |
56 | Yangjun Chen, Yibin Chen |
Signature file hierarchies and signature graphs: a new index method for object-oriented databases. |
SAC |
2004 |
DBLP DOI BibTeX RDF |
signature graphs, object-oriented database, system, index structure, signature files |
56 | Sujing Zhou, Dongdai Lin |
Unlinkable Randomizable Signature and Its Application in Group Signature. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Randomizable Signature, Sigma-protocol, Digital Signature, Group Signature |
54 | Di Ma |
Practical forward secure sequential aggregate signatures. |
AsiaCCS |
2008 |
DBLP DOI BibTeX RDF |
forward secure sequential aggregate authentication, quality of forward security, MAC, signature |
54 | Vishal Saraswat, Aaram Yun |
Anonymous Signatures Revisited. |
ProvSec |
2009 |
DBLP DOI BibTeX RDF |
anonymous signature, unpreten- dability, anonymity, signature |
54 | Rohayu Yusof, Shuzlina Abdul Rahman, Marina Yusoff, Sofianita Mutalib, Azlinah Mohamed |
Online Slant Identification Algorithm Using Vector Rules. |
ICCSA (1) |
2008 |
DBLP DOI BibTeX RDF |
Slant, Online Signature, Signature Identification |
54 | Adam L. Young, Moti Yung |
The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
DSA signature, Menezes-Vanstone PKCS, Schnorr signature algorithm, protocol abuse, leakage-bandwidth, cryptographic system implementations, randomness, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, setup, ElGamal encryption, ElGamal signature, Discrete-Log |
54 | Chih-Hung Wang, Tzonelih Hwang |
Threshold and Generalized DSS Signatures without a Trusted Party. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
(t+1,n) threshold signature scheme, generalized DSS signatures, trusted party, secret key sharing, valid group signature, Digital Signature Standard, signers, conspiracy, signing procedure, cryptography |
53 | Haeryong Park, Hyun Kim, Kilsoo Chun, Jaeil Lee, Seongan Lim, Ikkwon Yie |
Untraceability of Group Signature Schemes based on Bilinear Mapping and Their Improvement. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Ran Gal, Ariel Shamir, Daniel Cohen-Or |
Pose-Oblivious Shape Signature. |
IEEE Trans. Vis. Comput. Graph. |
2007 |
DBLP DOI BibTeX RDF |
Shape-signature, pose-oblivious, shape-matching |
53 | Bessie C. Hu, Duncan S. Wong, Qiong Huang 0001, Guomin Yang, Xiaotie Deng |
Time Capsule Signature: Efficient and Provably Secure Constructions. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
Time Capsule Signature |
53 | Piotr Porwik |
The Compact Three Stages Method of the Signature Recognition. |
CISIM |
2007 |
DBLP DOI BibTeX RDF |
Signature recognition, centre of gravity, person's identification, histograms, Hough transform, pre-processing |
53 | Jiqiang Lu |
Security Weaknesses in Two Proxy Signature Schemes. |
ICCSA (3) |
2006 |
DBLP DOI BibTeX RDF |
Public key cryptology, Proxy signature, Forgery attack |
53 | Luigi Lepanto |
Impact of Electronic Signature on Radiology Report Turnaround Time. |
J. Digit. Imaging |
2003 |
DBLP DOI BibTeX RDF |
diagnostic reporting, report turnaround, Electronic signature |
53 | Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen |
A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery. |
CIS |
2006 |
DBLP DOI BibTeX RDF |
fair partitioning, anonymity, bilinear pairing, Ring signature, threshold signature |
53 | Yu-Fang Chung, Chia-Hui Liu, Feipei Lai, Tzer-Shyong Chen |
Threshold Signature Scheme Resistible for Conspiracy Attack. |
PDCAT |
2006 |
DBLP DOI BibTeX RDF |
conspiracy attack and group signature, threshold cryptography, Threshold signature |
53 | Helger Lipmaa, Guilin Wang, Feng Bao 0001 |
Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction. |
ICALP |
2005 |
DBLP DOI BibTeX RDF |
Designated verifier signature scheme, non-delegatability, non-programmable random oracle model, signature scheme |
53 | Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto |
A Proposal of Short Proxy Signature using Pairing. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
general hash function, bilinear pairing, elliptic curve cryptosystem, proxy signature, short signature |
53 | Guilin Wang |
On the Security of a Group Signature Scheme with Forward Security. |
ICISC |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signature, group signature, forward security |
53 | Guilin Wang |
Security Analysis of Several Group Signature Schemes. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signature, group signature, forgery |
53 | Gang Li, Yanling Li, Chuanda Qi |
Analysis on a Non-repudiable Threshold Proxy Signature Scheme with Known Signers. |
ISNN (2) |
2009 |
DBLP DOI BibTeX RDF |
Tulti-signature, Threshold proxy signature, Digital signature, Proxy signature |
52 | Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang |
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Tianjie Cao, Dongdai Lin |
Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Debasish Jena, Sanjay Kumar Jena, Banshidhar Majhi |
A Novel Blind Signature Scheme Based on Nyberg-Rueppel Signature Scheme and Applying in Off-Line Digital Cash. |
ICIT |
2007 |
DBLP DOI BibTeX RDF |
RSA, Elliptic Curve, Blind signature, ElGamal, Digital Cash |
52 | Yuliang Zheng 0001 |
Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption). |
CRYPTO |
1997 |
DBLP DOI BibTeX RDF |
Secure Message Delivery/Storage, Security, Authentication, Digital Signature, Encryption, Public Key Cryptography, Key Distribution, Signcryption |
52 | Yangjun Chen |
On the Signature Trees and Balanced Signature Trees. |
ICDE |
2005 |
DBLP DOI BibTeX RDF |
Bit-slice files, S-trees, Signature trees, Information retrieval, Signature files |
49 | Byoungcheon Lee, Kim-Kwang Raymond Choo, Jeongmo Yang, Seungjae Yoo |
Secret Signatures: How to Achieve Business Privacy Efficiently? |
WISA |
2007 |
DBLP DOI BibTeX RDF |
Secret signature, signature privacy, public provability, public auction, anonymity, key agreement |
49 | Xiangguo Cheng, Huafei Zhu, Ying Qiu, Xinmei Wang |
Efficient Group Signatures from Bilinear Pairing. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
GDH group, Digital signature, Bilinear pairing, Group signature |
49 | Zhenjie Huang, Yumin Wang |
Convertible Nominative Signatures. |
ACISP |
2004 |
DBLP DOI BibTeX RDF |
nominative signature, untransferable, Digital signature, convertible |
49 | Laurence Bull, Peter Stañski, David Squire |
Content extraction signatures using XML digital signatures and custom transforms on-demand. |
WWW |
2003 |
DBLP DOI BibTeX RDF |
Net framework XML signature API, XML signature custom transforms, content extraction signatures, XML signatures, dynamic signature verification |
49 | Jinhong Katherine Guo, David S. Doermann, Azriel Rosenfeld |
Local correspondence for detecting random forgeries. |
ICDAR |
1997 |
DBLP DOI BibTeX RDF |
local correspondence, random forgery detection, online applications, offline applications, forged signatures, stroke level, stroke segmentation, stylistically meaningful segments, questioned signature, reference signature, stroke features, random forgeries, skilled forgeries, handwriting recognition, signature verification, invariant properties |
48 | Fuchun Guo, Yi Mu 0001 |
Optimal Online/Offline Signature: How to Sign a Message without Online Computation. |
ProvSec |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Haifeng Qian, Zhibin Li 0005, Zhijie Chen, Siman Yang |
A Practical Optimal Padding for Signature Schemes. |
CT-RSA |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Wei Wu 0001 |
Universal Designated Verifier Signature Without Delegatability. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
Universal Designated Verifier Signatures, Non-delegatability, Bilinear Pairings, Designated Verifier Signatures |
48 | Atsuko Miyaji, Kozue Umeda |
A Fully-Functional Group Signature Scheme over Only Known-Order Group. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
|
48 | Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng |
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. |
Public Key Cryptography |
2001 |
DBLP DOI BibTeX RDF |
|
48 | Hakgene Shin, Jae-Woo Chang |
Combining C-signature with Path Dictionary for Query Processing of Nested Objects in OODBS. |
DEXA |
1999 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 13353 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|