Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
196 | Hoonjung Lee, Donghyun Kim 0001, Sangjin Kim, Heekuck Oh |
Identity-Based Key Agreement Protocols in a Multiple PKG Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part IV, pp. 877-886, 2005, Springer, 3-540-25863-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
multiple PKG, bilinear map, key agreement protocol, ID-based cryptosystem |
120 | Xiaofeng Chen 0001, Fangguo Zhang, Divyan M. Konidala, Kwangjo Kim |
New ID-Based Threshold Signature Scheme from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings, pp. 371-383, 2004, Springer, 3-540-24130-2. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
ID-based threshold signature, Bilinear pairings, Key escrow |
109 | Man Ho Au, Qiong Huang 0001, Joseph K. Liu, Willy Susilo, Duncan S. Wong, Guomin Yang |
Traceable and Retrievable Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 6th International Conference, ACNS 2008, New York, NY, USA, June 3-6, 2008. Proceedings, pp. 94-110, 2008, 978-3-540-68913-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
PKG, Trust, Retrievability, Traceability, Identity-based Encryption |
96 | Sangjin Kim, Hoonjung Lee, Heekuck Oh |
Enhanced ID-Based Authenticated Key Agreement Protocols for a Multiple Independent PKG Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 323-335, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
multiple PKG environment, key agreement protocol, ID-based cryptosystem |
87 | Shanqing Guo, Chunhua Zhang |
Identity-based Broadcast Encryption Scheme with Untrusted PKG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 1613-1618, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
87 | Jong-Hyouk Lee, Young-Ju Han, Jong-Hyun Kim, Jung-Chan Na, Tai-Myoung Chung |
PKG-MIB: Private-Mib for Package-Based Linux Systems in a Large Scale Management Domain. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES-AMSTA ![In: Agent and Multi-Agent Systems: Technologies and Applications, First KES International Symposium, KES-AMSTA 2007, Wroclaw, Poland, May 31- June 1, 2007, Proceedings, pp. 833-840, 2007, Springer, 978-3-540-72829-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
87 | Vipul Goyal |
Reducing Trust in the PKG in Identity Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2007, 27th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2007, Proceedings, pp. 430-447, 2007, Springer, 978-3-540-74142-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
80 | Jeremy Horwitz, Ben Lynn |
Toward Hierarchical Identity-Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002, Proceedings, pp. 466-481, 2002, Springer, 3-540-43553-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
76 | Guoyan Zhang, Shaohui Wang |
A Certificateless Signature and Group Signature Schemes against Malicious PKG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, GinoWan, Okinawa, Japan, March 25-28, 2008, pp. 334-341, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
malicious PKG, group signature, certificateless signature |
67 | Lingling Xu, Mingqiang Wang |
New ID-Based Signatures without Trusted PKG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WKDD ![In: Proceedings of the International Workshop on Knowledge Discovery and Data Mining, WKDD 2008, Adelaide, Australia, 23-24 January 2008, pp. 589-593, 2008, IEEE Computer Society, 0-7695-3090-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
67 | Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong |
ID-Based Signature Scheme Without Trusted PKG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 53-62, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
56 | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi |
Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 289-304, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
identity-based signcryption, multi-PKG, Ad hoc networks, provable security, bilinear pairings |
40 | Mengbo Hou, Qiuliang Xu |
A Secure ID-Based Explicit Authenticated Key Agreement Protocol without Key Escrow. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 487-490, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
40 | Xiaofeng Wang, Nanning Zheng 0001 |
ID-Based Authenticated Multi-party Key Agreement Protocol to Multimedia Applications Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSSE (3) ![In: International Conference on Computer Science and Software Engineering, CSSE 2008, Volume 3: Grid Computing / Distributed and Parallel Computing / Information Security, December 12-14, 2008, Wuhan, China, pp. 1007-1010, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Nolwenn Bernard, Ivica Kostric, Weronika Lajewska, Krisztian Balog, Petra Galuscáková, Vinay Setty, Martin G. Skjæveland |
PKG API: A Tool for Personal Knowledge Graph Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/2402.07540, 2024. The full citation details ...](Pics/full.jpeg) |
2024 |
DBLP DOI BibTeX RDF |
|
27 | Saptarshi Chakraborty, Marianthi Markatou, Robert Ball |
Likelihood Ratio Test-Based Drug Safety Assessment using R Package \pkg{pvLRT}. ![Search on Bibsonomy](Pics/bibsonomy.png) |
R J. ![In: R J. 15(1), pp. 101-121, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Florian Pfisterer, Siyi Wei, Sebastian J. Vollmer, Michel Lang, Bernd Bischl |
Fairness Audits and Debiasing Using \pkg{mlr3fairness}. ![Search on Bibsonomy](Pics/bibsonomy.png) |
R J. ![In: R J. 15(1), pp. 234-253, March 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | Haley Jeppson, Heike Hofmann |
Generalized Mosaic Plots in the \pkg{ggplot2} Framework. ![Search on Bibsonomy](Pics/bibsonomy.png) |
R J. ![In: R J. 14(4), pp. 50-78, February 2023. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
27 | RunQi Li |
Research on Key Security Detection Method of Cross Domain Information Sharing Based on PKG Trust Gateway. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Interconnect. Networks ![In: J. Interconnect. Networks 22(Supp-01), pp. 2141014:1-2141014:18, 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Krisztian Balog, Paramita Mirza, Martin G. Skjæveland, Zhilin Wang |
Report on the Workshop on Personal Knowledge Graphs (PKG 2021) at AKBC 2021. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR Forum ![In: SIGIR Forum 56(1), pp. 4:1-4:11, June 2022. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Yu Yang, Jiangxu Lin, Xiaolian Zhang, Meng Wang 0009 |
PKG: A Personal Knowledge Graph for Recommendation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11 - 15, 2022, pp. 3334-3338, 2022, ACM, 978-1-4503-8732-3. The full citation details ...](Pics/full.jpeg) |
2022 |
DBLP DOI BibTeX RDF |
|
27 | Renu Mary Daniel, Anitha Thomas |
A Provably Secure Identity Based Authenticated Key Agreement Protocol with Multiple PKG Compatibility for Inter-Vehicular Ad hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Integr. Des. Process. Sci. ![In: J. Integr. Des. Process. Sci. 25(1), pp. 55-77, 2021. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Sergey Bezzateev, Aleksandra Afanasyeva, Konstantin Zhidanov, Aleksandr Ometov |
Multi-Layer Message Signature Scheme with Threshold-based Distributed PKG and Dynamic Leader Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
BCCA ![In: Third International Conference on Blockchain Computing and Applications, BCCA 2021, Tartu, Estonia, November 15-17, 2021, pp. 151-155, 2021, IEEE, 978-1-6654-2182-9. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
27 | Shengbao Wang, Zhenfu Cao, Qi Xie, Wenhao Liu |
Practical identity-based encryption in multiple private key generator (PKG) environments. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Secur. Commun. Networks ![In: Secur. Commun. Networks 8(1), pp. 43-50, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Harish Karthikeyan, Suvradip Chakraborty, Kunwar Singh, C. Pandu Rangan |
An Efficient Multiple PKG Compatible Identity Based Key Agreement for Vehicular Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2015, pp. 1012, 2015. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP BibTeX RDF |
|
27 | Limin Sha |
Improvement of an ID-based proxy signature scheme without trusted PKG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: 16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2015, Takamatsu, Japan, June 1-3, 2015, pp. 171-174, 2015, IEEE Computer Society, 978-1-4799-8676-7. The full citation details ...](Pics/full.jpeg) |
2015 |
DBLP DOI BibTeX RDF |
|
27 | Limin Sha |
Analysis of an ID-based proxy signature scheme without trusted PKG and a proxy blind multi-signature scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD ![In: 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2014, Las Vegas, NV, USA, June 30 - July 2, 2014, pp. 1-4, 2014, IEEE Computer Society, 978-1-4799-5604-3. The full citation details ...](Pics/full.jpeg) |
2014 |
DBLP DOI BibTeX RDF |
|
27 | Jindan Zhang, Xu An Wang 0001, Xiaoyuan Yang 0002 |
Identity Based Proxy Re-encryption Based on BB2 and SK IBE with the Help of PKG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. ![In: J. Comput. 8(5), pp. 1230-1239, 2013. The full citation details ...](Pics/full.jpeg) |
2013 |
DBLP BibTeX RDF |
|
27 | Zuowen Tan |
Identity-based Authenticated Multiple Key Agreement Protocol with PKG Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KSII Trans. Internet Inf. Syst. ![In: KSII Trans. Internet Inf. Syst. 6(8), pp. 1982-1997, 2012. The full citation details ...](Pics/full.jpeg) |
2012 |
DBLP DOI BibTeX RDF |
|
27 | Zhong Xu, Ruiping Ma, Shuai Liu, Wenbo He |
EISM: An Efficient ID-based Signcryption Scheme for Multi-PKG Multihop Wireless Networks of Mobile Hosts. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Ad Hoc Sens. Wirel. Networks ![In: Ad Hoc Sens. Wirel. Networks 11(1-2), pp. 93-110, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
27 | Xiaofeng Wang, Shangping Wang |
An Identity-Based Mediated Signature Scheme Without Trusted PKG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Informatica (Slovenia) ![In: Informatica (Slovenia) 35(1), pp. 83-90, 2011. The full citation details ...](Pics/full.jpeg) |
2011 |
DBLP BibTeX RDF |
|
27 | Shengbao Wang, Zhenfu Cao, Feng Cao |
Efficient Identity-based Authenticated Key Agreement Protocol with PKG Forward Secrecy. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Netw. Secur. ![In: Int. J. Netw. Secur. 7(2), pp. 181-186, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
27 | Hyun-Ho Kim, Sang-Hyun Choi, Sang-Hyun Shin, Young-Ki Lee, Seok-Moon Choi, Sung Yi |
Thermal transient characteristics of die attach in high power LED PKG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Microelectron. Reliab. ![In: Microelectron. Reliab. 48(3), pp. 445-454, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Xu An Wang 0001, Xiaoyuan Yang 0002, Fagen Li |
On the Role of PKG for Proxy Re-encryption in Identity Based Setting. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 410, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
27 | Sunder Lal, Prashant Kushwah |
Multi-PKG ID based signcryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2008, pp. 50, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP BibTeX RDF |
|
27 | Liuquan Qin, Zhenfu Cao, Xiaolei Dong |
Multi-Receiver Identity-Based Encryption in Multiple PKG Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GLOBECOM ![In: Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November - 4 December 2008, pp. 1862-1866, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Yihua Yu, Shihui Zheng, Yixian Yang |
ID-Based Blind Signature and Proxy Blind Signature without Trusted PKG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSICC ![In: Advances in Computer Science and Engineering - 13th International CSI Computer Conference, CSICC 2008, Kish Island, Iran, March 9-11, 2008 Revised Selected Papers, pp. 821-824, 2008, 978-3-540-89984-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
27 | Shengbao Wang |
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications ![Search on Bibsonomy](Pics/bibsonomy.png) |
CoRR ![In: CoRR abs/cs/0703106, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
27 | Vipul Goyal |
Reducing Trust in the PKG in Identity Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 368, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
27 | Shengbao Wang, Zhenfu Cao |
Practical Identity-Based Encryption (IBE) in Multiple PKG Environments and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 100, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
27 | Jingwei Liu, Rong Sun, Weidong Kou, Xinmei Wang |
Efficient ID-based Signature Without Trusted PKG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IACR Cryptol. ePrint Arch. ![In: IACR Cryptol. ePrint Arch. 2007, pp. 135, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP BibTeX RDF |
|
27 | Jong Hyok Lee, Tai-Myoung Chung |
PKG-MIB: Design and Implementation of Private-mib for Package-based Linux Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Convergence Inf. Technol. ![In: J. Convergence Inf. Technol. 1(1), pp. 39-46, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP BibTeX RDF |
|
27 | JoongHyo Oh, Sang-Jae Moon, Jianfeng Ma 0001 |
An Attack on the Identity-Based Key Agreement Protocols in Multiple PKG Environment. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. ![In: IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(3), pp. 826-829, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Xu An Wang 0001, Xiaoyuan Yang 0002 |
Proxy Re-encryption Scheme Based on SK Identity Based Encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 657-660, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Benoît Libert, Damien Vergnaud |
Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 235-255, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
efficiency, traceability, Identity-based encryption |
20 | Fei Richard Yu, Helen Tang, Fei Wang 0006, Victor C. M. Leung |
Distributed Node Selection for Threshold Key Management with Intrusion Detection in Mobile Ad Hoc Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSE (2) ![In: Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, CSE 2009, Vancouver, BC, Canada, August 29-31, 2009, pp. 787-794, 2009, IEEE Computer Society, 978-1-4244-5334-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
20 | Vipul Goyal, Steve Lu 0001, Amit Sahai, Brent Waters |
Black-box accountable authority identity-based encryption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008, pp. 427-436, 2008, ACM, 978-1-59593-810-7. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
accountable authority, identity-based encryption |
20 | Licheng Wang, Zhenfu Cao, Feng Cao, Haifeng Qian |
Cryptanalysis and Improvement on An ID-Based Key Issuing Protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS (2) ![In: Interdisciplinary and Multidisciplinary Research in Computer Science, IEEE CS Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS|06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2, pp. 8-12, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
20 | Lichen Wang, Zhenfu Cao, Xiangxue Li, Haifeng Qian |
Certificateless Threshold Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS (2) ![In: Computational Intelligence and Security, International Conference, CIS 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part II, pp. 104-109, 2005, Springer, 3-540-30819-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|