|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 22 occurrences of 19 keywords
|
|
|
Results
Found 16 publication records. Showing 16 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
36 | Jianhong Zhang, Yixian Yang, Xinxin Niu, Shengnan Gao, Hua Chen, Qin Geng |
An Improved Secure Identity-Based On-Line/Off-Line Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISA ![In: Advances in Information Security and Assurance, Third International Conference and Workshops, ISA 2009, Seoul, Korea, June 25-27, 2009. Proceedings, pp. 588-597, 2009, Springer, 978-3-642-02616-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
On-line/off-line signature, Forgeability, Attack, Security Analysis |
35 | Zhifeng Kong, Amrita Roy Chowdhury 0001, Kamalika Chaudhuri |
Forgeability and Membership Inference Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AISec@CCS ![In: Proceedings of the 15th ACM Workshop on Artificial Intelligence and Security, AISec 2022, Los Angeles, CA, USA, 11 November 2022, pp. 25-31, 2022, ACM, 978-1-4503-9880-0. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
35 | Ai-Jun Ge 0001, Xinyi Huang 0001, Cheng Chen, Chuangui Ma, Rui Zhang 0002 |
Forgeability of Wang-Zhu-Feng-Yau's Attribute-Based Signature with Policy-and-Endorsement Mechanism. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 28(4), pp. 743-748, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP DOI BibTeX RDF |
|
35 | Jianhong Zhang, Fenhong Guo, Zhibin Sun, Jilin Wang |
Forgeability Attack of Two DLP-Base Proxy Blind Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICSI (2) ![In: Advances in Swarm Intelligence - Second International Conference, ICSI 2011, Chongqing, China, June 12-15, 2011, Proceedings, Part II, pp. 395-402, 2011, Springer, 978-3-642-21523-0. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
35 | Jianhong Zhang, Yuanbo Cui, Xi Wu 0002 |
Forgeability Attack of Two Special Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Advanced Intelligent Computing - 7th International Conference, ICIC 2011, Zhengzhou, China, August 11-14, 2011. Revised Selected Papers, pp. 494-501, 2011, Springer, 978-3-642-24727-9. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP DOI BibTeX RDF |
|
35 | Shengli Liu 0001, Xiaofeng Chen 0001, Fangguo Zhang |
Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 23(2), pp. 265-269, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
ID-based cryptography, electronic cash, unforgeability, restrictive partially blind signature |
35 | Shengli Liu 0001, Xiaofeng Chen 0001, Fangguo Zhang |
On the Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 225, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
35 | Zhengjun Cao |
Universal Forgeability of Wang-Wu-Wang Key-Insulated Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 307, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
35 | Lihua Liu, Zhengjun Cao |
Universal Forgeability of a Forward-Secure Blind Signature Scheme Proposed by Duc et al. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2004, pp. 262, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP BibTeX RDF |
|
24 | Lein Harn, Jian Ren 0001, Changlu Lin |
Efficient identity-based GQ multisignatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(3), pp. 205-210, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
ISO/IEC standard, Public-key cryptography, Identity-based signature, Multisignature |
24 | Jianhong Zhang, Cheng Ji |
On the Security of two Authenticated Encryption Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, Hainan, China, 6-8 April 2008, pp. 1315-1319, 2008, IEEE, 978-1-4244-1685-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
24 | Sanjam Garg, Raghav Bhaskar, Satyanarayana V. Lokam |
Improved Bounds on Security Reductions for Discrete Log Based Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2008, 28th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2008. Proceedings, pp. 93-107, 2008, Springer, 978-3-540-85173-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Schnorr Signature Scheme, Provable Security, Random Oracle Model |
24 | Kazuki Yoneyama, Kazuo Ohta |
Ring signatures: universally composable definitions and constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2007, Singapore, March 20-22, 2007, pp. 374-376, 2007, ACM, 1-59593-574-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anonymity, ring signature, universal composability, unforgeability |
24 | Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng |
The security of the FDH variant of Chaum's undeniable signature scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 52(5), pp. 2006-2017, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
24 | Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng |
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings, pp. 328-345, 2005, Springer, 3-540-24454-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
security analysis, Undeniable signature |
24 | Song Han 0004, Jie Wang 0038, Wanquan Liu |
An Efficient Identity-Based Group Signature Scheme over Elliptic Curves. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ECUMN ![In: Universal Multiservice Networks: Third European Conference, ECUMN 2004, Porto, Portugal, October 25-27, 2004. Proceedings, pp. 417-429, 2004, Springer, 3-540-23551-5. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Network Security, Anonymity, Security Protocol, Group Signatures, Weil Pairings |
Displaying result #1 - #16 of 16 (100 per page; Change: )
|
|