|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5777 occurrences of 2201 keywords
|
|
|
Results
Found 13353 publication records. Showing 13353 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
102 | Yangjun Chen |
On the General Signature Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 16th International Conference, DEXA 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 207-219, 2005, Springer, 3-540-28566-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
signature identifier, signature tree, information retrieval, index, signature file |
88 | Huaqun Wang, Futai Zhang, Yanfei Sun |
Cryptanalysis of a Generalized Ring Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 6(2), pp. 149-151, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
88 | Song Han 0004, Elizabeth Chang 0001, Tharam S. Dillon, Jie Wang 0038 |
Improvement of a Convertible Undeniable Partially Blind Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 875-882, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Partially blind signature, Convertible undeniable signature, Security protocol, Blind signature, Undeniable signature |
85 | Byoungcheon Lee, Kwangjo Kim |
Self-certified Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002, pp. 199-214, 2002, Springer, 3-540-00263-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
self-certified signature, self-certified key, multi-certification signature, privilege management infrastructure, digital signature, public key infrastructure |
84 | Dae Hyun Yum, Pil Joong Lee |
Generic Construction of Certificateless Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 200-211, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
public-key signature, identity-based signature, Certificateless signature |
78 | Jian Ren 0001, Lein Harn |
Ring Signature Based on ElGamal Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WASA ![In: Wireless Algorithms, Systems, and Applications, First International Conference, WASA 2006, Xi'an, China, August 15-17, 2006, Proceedings, pp. 445-456, 2006, Springer, 3-540-37189-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
76 | Ronald L. Rivest, Adi Shamir, Yael Tauman |
How to Leak a Secret. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 552-565, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
ring signature scheme, signer-ambiguous signature scheme, designated verifier signature scheme, signature scheme, group signature scheme |
75 | Yung-Yuan Chen |
Concurrent Detection of Control Flow Errors by Hybrid Signature Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Computers ![In: IEEE Trans. Computers 54(10), pp. 1298-1313, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
error-detection latency, Concurrent error detection, signature scheme, watchdog processor, error-detection coverage |
75 | Haeryong Park, Zhengjun Cao, Lihua Liu, Seongan Lim, Ikkwon Yie, Kilsoo Chun |
Cryptanalysis of Two Signature Schemes Based on Bilinear Pairings in CISC '05. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings, pp. 1-12, 2006, Springer, 3-540-49608-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
bilinear pairing, group signature, ID-based cryptography, verifiably encrypted signature |
75 | Dae Hyun Yum, Pil Joong Lee |
Efficient Key Updating Signature Schemes Based on IBS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings, pp. 167-182, 2003, Springer, 3-540-20663-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Key insulated signature, intrusion resilient siganture, identity based signature |
75 | Yumin Yuan |
A Threshold Proxy Signature Scheme with Nonrepudiation and Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISCIS ![In: Computer and Information Sciences - ISCIS 2006, 21th International Symposium, Istanbul, Turkey, November 1-3, 2006, Proceedings, pp. 1002-1010, 2006, Springer, 3-540-47242-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
threshold proxy signature, anonymity, Digital signature, proxy signature, nonrepudiation |
75 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
Short (Identity-Based) Strong Designated Verifier Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, pp. 214-225, 2006, Springer, 3-540-33052-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
strong designated verifier signature scheme, random oracle model, short signature, identity based, designated verifier signature |
75 | Marc Joye, Hung-Mei Lin |
On the TYS Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 338-344, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
TYS signature scheme, Camenisch-Lysyanskaya signature scheme, Cryptography, digital signature, standard model |
70 | Sung-Hyun Yun, Hyung-Woo Lee |
The Efficient Multipurpose Convertible Undeniable Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
KES (3) ![In: Knowledge-Based Intelligent Information and Engineering Systems, 9th International Conference, KES 2005, Melbourne, Australia, September 14-16, 2005, Proceedings, Part III, pp. 325-331, 2005, Springer, 3-540-28896-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
70 | Yung-Yuan Chen |
Concurrent Detection of Processor Control Errors by Hybrid Signature Monitoring. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDCC ![In: Dependable Computing - EDCC-3, Third European Dependable Computing Conference, Prague, Czech Republic, September 15-17, 1999, Proceedings, pp. 437-454, 1999, Springer, 3-540-66483-1. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
70 | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow |
Two Improved Partially Blind Signature Schemes from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings, pp. 316-328, 2005, Springer, 3-540-26547-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
threshold partially blind signature, identity-based partially blind signature, bilinear pairings |
70 | Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka |
Sanitizable and Deletable Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, pp. 130-144, 2008, Springer, 978-3-642-00305-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
sanitizable signature, deletable signature, Digital signature, aggregate signature |
69 | Zhengjun Cao, Mulan Liu |
Classification of signature-only signature models. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 51(8), pp. 1083-1095, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
signature-only signature, signing party, verifying party, lucidity of a message’s content, method of producing Pk, consequence of updating Sk |
67 | Emeline Hufschmitt, Jacques Traoré |
Fair Blind Signatures Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings, pp. 268-292, 2007, Springer, 978-3-540-73488-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security Model, electronic voting, Blind signatures, Anonymity Revocation |
67 | Raylin Tso, Chunxiang Gu, Takeshi Okamoto, Eiji Okamoto |
Efficient ID-Based Digital Signatures with Message Recovery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings, pp. 47-59, 2007, Springer, 978-3-540-76968-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
k-BDHI problem, pairing, short signature, ID-based signature, message recovery |
66 | Seongan Lim, Seungjoo Kim, Ikkwon Yie, Jaemoon Kim |
Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 308-315, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Trace Projection, LFSR, digital signature scheme, XTR |
66 | Harish Srinivasan, Sargur N. Srihari, Matthew J. Beal |
Machine Learning for Signature Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICVGIP ![In: Computer Vision, Graphics and Image Processing, 5th Indian Conference, ICVGIP 2006, Madurai, India, December 13-16, 2006, Proceedings, pp. 761-775, 2006, Springer, 3-540-68301-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
forensic signature examination, digital document processing, machine learning, biometrics, signature verification |
66 | Haifeng Qian, Zhenfu Cao |
A Novel ID-Based Partial Delegation with Warrant Proxy Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Parallel and Distributed Processing and Applications - ISPA 2005 Workshops, ISPA 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings, pp. 323-331, 2005, Springer, 3-540-29770-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
RSA, provably secure, random oracle model, proxy signature, identity-based signature |
66 | Guilin Wang, Xiaoxi Han, Bo Zhu |
On the Security of Two Threshold Signature Schemes with Traceable Signers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, pp. 111-122, 2003, Springer, 3-540-20208-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signature, threshold signature |
66 | Byoungcheon Lee, Heesun Kim, Kwangjo Kim |
Secure Mobile Agent Using Strong Non-designated Proxy Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 474, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Secure mobile agent, strong non-designated proxy signature, multi-proxy signature |
66 | Rongxing Lu, Xiaolei Dong, Zhenfu Cao |
Designing efficient proxy signature schemes for mobile communication. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 51(2), pp. 183-195, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
proxy protected signature, proxy aggregate signature, efficiency, provable secure, bilinear pairings, proxy signature |
66 | N. R. Sunitha, B. B. Amberker |
Proxy Re-signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISS ![In: Information Systems Security, 4th International Conference, ICISS 2008, Hyderabad, India, December 16-20, 2008. Proceedings, pp. 156-157, 2008, Springer, 978-3-540-89861-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Signature conversion, Proxy re-signature, Proxy revocation, Proxy key, Proxy Signature |
66 | Chunguang Ma, Peng Wu, Guochang Gu |
A New Method for the Design of Stateless Transitive Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
APWeb Workshops ![In: Advanced Web and Network Technologies, and Applications, APWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE, Harbin, China, January 16-18, 2006, Proceedings, pp. 897-904, 2006, Springer, 3-540-31158-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
stateless signature, transitive signature, Cryptography, digital signature |
65 | Fangguo Zhang, Kwangjo Kim |
Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 312-323, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Bilinear pairings, Proxy signature, Blind signature, ID-based cryptography |
63 | Jian Ren 0001, Lein Harn |
Generalized Ring Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 5(3), pp. 155-163, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
63 | Jin Li 0002, Yuen-Yan Chan, Yanming Wang |
A Generic Construction of Secure Signatures Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 309-317, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Weak Chosen Message Attack, Signature, Standard Model |
63 | Sherman S. M. Chow, Zhengjun Cao, Joseph K. Liu |
Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 290-301, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
secret sharing, bilinear pairings, Group signature, signcryption, proxy signature, identity-based signature |
62 | Jung Yeon Hwang, Hyun-Jeong Kim, Dong Hoon Lee 0001, Jong In Lim 0001 |
Digital Signature Schemes with Restriction on Signing Capability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings, pp. 324-335, 2003, Springer, 3-540-40515-1. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
62 | Jianhong Zhang, Yixian Yang, Xinxin Niu |
Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (3) ![In: Advances in Neural Networks - ISNN 2009, 6th International Symposium on Neural Networks, ISNN 2009, Wuhan, China, May 26-29, 2009, Proceedings, Part III, pp. 318-327, 2009, Springer, 978-3-642-01512-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Directed signature, CDH problem, DBDH problem, Standard model, ID-based |
62 | Mingwen Wang, Qingxin Zhu, Li Qing |
A Robust Coalition-Resistant Threshold Signature Scheme with Anonymous Signers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPA Workshops ![In: Parallel and Distributed Processing and Applications - ISPA 2005 Workshops, ISPA 2005 International Workshops AEPP, ASTD, BIOS, GCIC, IADS, MASN, SGCA, and WISA, Nanjing, China, November 2-5, 2005, Proceedings, pp. 315-322, 2005, Springer, 3-540-29770-7. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
group scheme, coalition attack, robust scheme, digital signature, threshold scheme |
62 | Wei Zhao, Changlu Lin, Dingfeng Ye |
Provably Secure Convertible Nominative Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 23-40, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Nominative signature, Digital signature, Selectively, Universally, Convertible |
62 | Dennis Y. W. Liu, Joseph K. Liu, Yi Mu 0001, Willy Susilo, Duncan S. Wong |
Revocable Ring Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 22(6), pp. 785-794, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anonymity, group signature, revocability, ring signature |
62 | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Identity Based Threshold Ring Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 218-232, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Threshold ring signature, spontaneity, anonymity, bilinear pairings, identity-based signature |
61 | Joseph K. Liu, Willy Susilo, Duncan S. Wong |
Ring Signature with Designated Linkability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings, pp. 104-119, 2006, Springer, 3-540-47699-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
linkable ring signature, spontaneous group signature, ring signature |
61 | Christophe Giraud 0001, Erik Woodward Knudsen |
Fault Attacks on Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 478-491, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
XTR-DSA, Schnorr signature, Side-Channel Attack, Smartcard, Fault Attack, Signature schemes, DSA, ECDSA, ElGamal signature |
61 | Seungjoo Kim, Dongho Won |
Threshold Entrusted Undeniable Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 195-203, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Entrusted undeniable signature, Undeniable signature, Threshold signature |
60 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
Universal Designated Verifier Signature Proof (or How to Efficiently Prove Knowledge of a Signature). ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings, pp. 644-661, 2005, Springer, 3-540-30684-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
60 | Adam L. Young, Moti Yung |
Towards Signature-Only Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2000, 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000, Proceedings, pp. 97-115, 2000, Springer, 3-540-41404-5. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Public Key Cryptosystems (PKCS), nested trapdoor, abuse freeness, (subliminal) leakage, design validation proofs, FIPS, digital signature, decryption, Public Key Infrastructure (PKI), NIST |
60 | Fangguo Zhang, Kwangjo Kim |
ID-Based Blind Signature and Ring Signature from Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, pp. 533-547, 2002, Springer, 3-540-00171-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Provably security, Bilinear pairings, Blind signature, Ring signature, ID-based cryptography |
58 | Wei Gao 0007, Guilin Wang, Xueli Wang, Dongqing Xie |
Controllable Ring Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 7th International Workshop, WISA 2006, Jeju Island, Korea, August 28-30, 2006, Revised Selected Papers, pp. 1-14, 2006, Springer, 978-3-540-71092-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
58 | Isamu Teranishi, Takuro Oyama, Wakaha Ogata |
General Conversion for Obtaining Strongly Existentially Unforgeable Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 191-205, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
58 | Qiong Huang 0001, Duncan S. Wong, Jin Li 0002, Yiming Zhao |
Generic Transformation from Weakly to Strongly Unforgeable Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 23(2), pp. 240-252, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
weak unforgeability, signature, one-time signature, strong unforgeability |
58 | N. R. Sunitha, B. B. Amberker |
Forward-Secure Multi-signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, 5th International Conference, ICDCIT 2008, New Delhi, India, December 10-12, 2008. Proceedings, pp. 89-99, 2008, Springer, 978-3-540-89736-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Serial multi-signature, Parallel multi-signature, Digital Signature, Forward-Security, e-banking, ElGamal Signatures |
58 | Raylin Tso, Takeshi Okamoto, Eiji Okamoto |
1-out-of-. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 45-55, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
1-out-of-n signature, oblivious signature, Schnorr signature, oblivious transfer |
57 | Jianhong Zhang, Qin Geng |
An Efficient Proxy Signature Scheme with Full-delegation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICNSC ![In: Proceedings of the IEEE International Conference on Networking, Sensing and Control, ICNSC 2008, Hainan, China, 6-8 April 2008, pp. 513-518, 2008, IEEE, 978-1-4244-1685-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
57 | Young-Seol Kim, Jik-Hyun Chang |
Provably Secure Proxy Blind Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISM ![In: Eigth IEEE International Symposium on Multimedia (ISM 2006), 11-13 December 2006, San Diego, CA, USA, pp. 998-1003, 2006, IEEE Computer Society, 0-7695-2746-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Toru Nakanishi 0001, Nobuo Funabiki |
A short anonymously revocable group signature scheme from decision linear assumption. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 337-340, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anonymity, group signature, revocation |
57 | Ping Yu 0006, Stephen R. Tate |
Online/Offline Signature Schemes for Devices with Limited Computing Capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2008, The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings, pp. 301-317, 2008, Springer, 978-3-540-79262-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Online/Offline Signing, Devices with Limited Computing Capabilities, Digital Signature, Standard Model, Strong RSA Assumption |
57 | Adi Shamir, Yael Tauman |
Improved Online/Offline Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2001, 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19-23, 2001, Proceedings, pp. 355-367, 2001, Springer, 3-540-42456-3. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
on-line/off-line, trapdoor hash functions, signature schemes |
57 | Zhenfu Cao, Haojin Zhu, Rongxing Lu |
Provably secure robust threshold partial blind signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 49(5), pp. 604-615, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
improved RSA cryptosystem, factoring problem, blind signature, electronic cash, threshold signature |
57 | Yangjun Chen, Yibin Chen |
On the Signature Tree Construction and Analysis. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Knowl. Data Eng. ![In: IEEE Trans. Knowl. Data Eng. 18(9), pp. 1207-1224, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
bit-slice files, S-trees, signature trees, information retrieval, Signature files |
57 | He Ge, Stephen R. Tate |
Traceable Signature: Better Efficiency and Beyond. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 327-337, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Variable Anonymity, Cryptographic Protocol, Group signature, Anonymous Authentication, Traceable Signature |
57 | Sherman S. M. Chow, Richard W. C. Lui, Lucas Chi Kwong Hui, Siu-Ming Yiu |
Identity Based Ring Signature: Why, How and What Next. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30 - July 1, 2005, Revised Selected Papers, pp. 144-161, 2005, Springer, 3-540-28062-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
spontaneous anonymous group signature, bilinear pairings, PKI, Identity based cryptography, ring signature |
57 | Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Fangguo Zhang, Xiaofeng Chen 0001 |
A Short Proxy Signature Scheme: Efficient Authentication in the Ubiquitous World. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 480-489, 2005, Springer, 3-540-30803-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Authentication, Proxy Signature, Short Signature |
57 | Sherman S. M. Chow, Lucas Chi Kwong Hui, Siu-Ming Yiu, Kam-Pui Chow |
Secure Hierarchical Identity Based Signature and Its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 480-494, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Hierarchical identity-based signature, forward-secure signature, bilinear pairings |
57 | Guilin Wang, Feng Bao 0001, Jianying Zhou 0001, Robert H. Deng |
Security Remarks on a Group Signature Scheme with Member Deletion. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 5th International Conference, ICICS 2003, Huhehaote, China, October 10-13, 2003, Proceedings, pp. 72-83, 2003, Springer, 3-540-20150-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
member deletion, Digital signature, group signature |
57 | Adrian Perrig |
The BiBa one-time signature and broadcast authentication protocol. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 28-37, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
signature based on a one-way function without trapdoor, source authentication for multicast, broadcast authentication, one-time signature |
57 | Brigitte Wirtz |
Stroke-based time warping for signature verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: Third International Conference on Document Analysis and Recognition, ICDAR 1995, August 14 - 15, 1995, Montreal, Canada. Volume I, pp. 179-182, 1995, IEEE Computer Society, 0-8186-7128-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
stroke-based time warping, function-based signature verification, positional data, 3D nonlinear correlation, signature signals, stroke index, DP index, finite state automaton, reference strokes, dynamic programming, dynamic programming, handwriting recognition, image matching, finite automata, authorisation, correlation methods, pressure, dynamic data, dynamic signature verification |
57 | Ke Han, Ishwar K. Sethi |
Signature identification via local association of features. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: Third International Conference on Document Analysis and Recognition, ICDAR 1995, August 14 - 15, 1995, Montreal, Canada. Volume I, pp. 187-190, 1995, IEEE Computer Society, 0-8186-7128-9. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
signature identification, local association of features, automatic search, signature database, finite symbols, local associative indexing, performance, feature extraction, indexing, handwriting recognition, image matching, image matching, software performance evaluation, search problems, visual databases, authorisation, strings, signature verification, geometric features, spatial distribution, topologic features |
56 | Yangjun Chen, Yibin Chen |
Signature file hierarchies and signature graphs: a new index method for object-oriented databases. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pp. 724-728, 2004, ACM, 1-58113-812-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
signature graphs, object-oriented database, system, index structure, signature files |
56 | Sujing Zhou, Dongdai Lin |
Unlinkable Randomizable Signature and Its Application in Group Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 328-342, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Randomizable Signature, Sigma-protocol, Digital Signature, Group Signature |
54 | Di Ma |
Practical forward secure sequential aggregate signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, ASIACCS 2008, Tokyo, Japan, March 18-20, 2008, pp. 341-352, 2008, ACM, 978-1-59593-979-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
forward secure sequential aggregate authentication, quality of forward security, MAC, signature |
54 | Vishal Saraswat, Aaram Yun |
Anonymous Signatures Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 140-153, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymous signature, unpreten- dability, anonymity, signature |
54 | Rohayu Yusof, Shuzlina Abdul Rahman, Marina Yusoff, Sofianita Mutalib, Azlinah Mohamed |
Online Slant Identification Algorithm Using Vector Rules. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (1) ![In: Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30 - July 3, 2008, Proceedings, Part I, pp. 829-840, 2008, Springer, 978-3-540-69838-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Slant, Online Signature, Signature Identification |
54 | Adam L. Young, Moti Yung |
The Prevalence of Kleptographic Attacks on Discrete-Log Based Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 264-276, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
DSA signature, Menezes-Vanstone PKCS, Schnorr signature algorithm, protocol abuse, leakage-bandwidth, cryptographic system implementations, randomness, pseudorandomness, Diffie-Hellman, subliminal channels, kleptography, setup, ElGamal encryption, ElGamal signature, Discrete-Log |
54 | Chih-Hung Wang, Tzonelih Hwang |
Threshold and Generalized DSS Signatures without a Trusted Party. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 13th Annual Computer Security Applications Conference (ACSAC 1997), 8-12 December 1997, San Diego, CA, USA, pp. 221-226, 1997, IEEE Computer Society, 0-8186-8274-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
(t+1,n) threshold signature scheme, generalized DSS signatures, trusted party, secret key sharing, valid group signature, Digital Signature Standard, signers, conspiracy, signing procedure, cryptography |
53 | Haeryong Park, Hyun Kim, Kilsoo Chun, Jaeil Lee, Seongan Lim, Ikkwon Yie |
Untraceability of Group Signature Schemes based on Bilinear Mapping and Their Improvement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITNG ![In: Fourth International Conference on Information Technology: New Generations (ITNG 2007), 2-4 April 2007, Las Vegas, Nevada, USA, pp. 747-753, 2007, IEEE Computer Society, 978-0-7695-2776-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
53 | Ran Gal, Ariel Shamir, Daniel Cohen-Or |
Pose-Oblivious Shape Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Vis. Comput. Graph. ![In: IEEE Trans. Vis. Comput. Graph. 13(2), pp. 261-271, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Shape-signature, pose-oblivious, shape-matching |
53 | Bessie C. Hu, Duncan S. Wong, Qiong Huang 0001, Guomin Yang, Xiaotie Deng |
Time Capsule Signature: Efficient and Provably Secure Constructions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 126-142, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Time Capsule Signature |
53 | Piotr Porwik |
The Compact Three Stages Method of the Signature Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISIM ![In: 6th International Conference on Computer Information Systems and Industrial Management Applications, CISIM 2007, Elk, Poland, June 28-30, 2007, pp. 282-287, 2007, IEEE Computer Society, 0-7695-2894-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Signature recognition, centre of gravity, person's identification, histograms, Hough transform, pre-processing |
53 | Jiqiang Lu |
Security Weaknesses in Two Proxy Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (3) ![In: Computational Science and Its Applications - ICCSA 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part III, pp. 466-475, 2006, Springer, 3-540-34075-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Public key cryptology, Proxy signature, Forgery attack |
53 | Luigi Lepanto |
Impact of Electronic Signature on Radiology Report Turnaround Time. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Digit. Imaging ![In: J. Digit. Imaging 16(3), pp. 306-309, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
diagnostic reporting, report turnaround, Electronic signature |
53 | Yu-Fang Chung, Zhen Yu Wu, Feipei Lai, Tzer-Shyong Chen |
A Novel ID-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-forgery. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 502-512, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
fair partitioning, anonymity, bilinear pairing, Ring signature, threshold signature |
53 | Yu-Fang Chung, Chia-Hui Liu, Feipei Lai, Tzer-Shyong Chen |
Threshold Signature Scheme Resistible for Conspiracy Attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PDCAT ![In: Seventh International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2006), 4-7 December 2006, Taipei, Taiwan, pp. 479-483, 2006, IEEE Computer Society, 0-7695-2736-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
conspiracy attack and group signature, threshold cryptography, Threshold signature |
53 | Helger Lipmaa, Guilin Wang, Feng Bao 0001 |
Designated Verifier Signature Schemes: Attacks, New Security Notions and a New Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings, pp. 459-471, 2005, Springer, 3-540-27580-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Designated verifier signature scheme, non-delegatability, non-programmable random oracle model, signature scheme |
53 | Takeshi Okamoto, Atsuo Inomata, Eiji Okamoto |
A Proposal of Short Proxy Signature using Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 631-635, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
general hash function, bilinear pairing, elliptic curve cryptosystem, proxy signature, short signature |
53 | Guilin Wang |
On the Security of a Group Signature Scheme with Forward Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 27-39, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signature, group signature, forward security |
53 | Guilin Wang |
Security Analysis of Several Group Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings, pp. 252-265, 2003, Springer, 3-540-20609-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signature, group signature, forgery |
53 | Gang Li, Yanling Li, Chuanda Qi |
Analysis on a Non-repudiable Threshold Proxy Signature Scheme with Known Signers. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISNN (2) ![In: Advances in Neural Networks - ISNN 2009, 6th International Symposium on Neural Networks, ISNN 2009, Wuhan, China, May 26-29, 2009, Proceedings, Part II, pp. 904-910, 2009, Springer, 978-3-642-01509-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Tulti-signature, Threshold proxy signature, Digital signature, Proxy signature |
52 | Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang |
How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings, pp. 357-371, 2007, Springer, 3-540-69327-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Tianjie Cao, Dongdai Lin |
Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 233-241, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Debasish Jena, Sanjay Kumar Jena, Banshidhar Majhi |
A Novel Blind Signature Scheme Based on Nyberg-Rueppel Signature Scheme and Applying in Off-Line Digital Cash. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIT ![In: 10th International Conference on Information Technology, ICIT 2007, Roukela, India, 17-20 December 2007, pp. 19-22, 2007, IEEE Computer Society, 0-7695-3068-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
RSA, Elliptic Curve, Blind signature, ElGamal, Digital Cash |
52 | Yuliang Zheng 0001 |
Digital Signcryption or How to Achieve Cost(Signature & Encryption) << Cost(Signature) + Cost(Encryption). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 165-179, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Secure Message Delivery/Storage, Security, Authentication, Digital Signature, Encryption, Public Key Cryptography, Key Distribution, Signcryption |
52 | Yangjun Chen |
On the Signature Trees and Balanced Signature Trees. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDE ![In: Proceedings of the 21st International Conference on Data Engineering, ICDE 2005, 5-8 April 2005, Tokyo, Japan, pp. 742-753, 2005, IEEE Computer Society, 0-7695-2285-8. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Bit-slice files, S-trees, Signature trees, Information retrieval, Signature files |
49 | Byoungcheon Lee, Kim-Kwang Raymond Choo, Jeongmo Yang, Seungjae Yoo |
Secret Signatures: How to Achieve Business Privacy Efficiently? ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, pp. 30-47, 2007, Springer, 978-3-540-77534-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Secret signature, signature privacy, public provability, public auction, anonymity, key agreement |
49 | Xiangguo Cheng, Huafei Zhu, Ying Qiu, Xinmei Wang |
Efficient Group Signatures from Bilinear Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 128-139, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
GDH group, Digital signature, Bilinear pairing, Group signature |
49 | Zhenjie Huang, Yumin Wang |
Convertible Nominative Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy: 9th Australasian Conference, ACISP 2004, Sydney, Australia, July 13-15, 2004. Proceedings, pp. 348-357, 2004, Springer, 3-540-22379-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
nominative signature, untransferable, Digital signature, convertible |
49 | Laurence Bull, Peter Stañski, David Squire |
Content extraction signatures using XML digital signatures and custom transforms on-demand. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the Twelfth International World Wide Web Conference, WWW 2003, Budapest, Hungary, May 20-24, 2003, pp. 170-177, 2003, ACM, 1-58113-680-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Net framework XML signature API, XML signature custom transforms, content extraction signatures, XML signatures, dynamic signature verification |
49 | Jinhong Katherine Guo, David S. Doermann, Azriel Rosenfeld |
Local correspondence for detecting random forgeries. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: 4th International Conference Document Analysis and Recognition (ICDAR '97), 2-Volume Set, August 18-20, 1997, Ulm, Germany, Proceedings, pp. 319-323, 1997, IEEE Computer Society, 0-8186-7898-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
local correspondence, random forgery detection, online applications, offline applications, forged signatures, stroke level, stroke segmentation, stylistically meaningful segments, questioned signature, reference signature, stroke features, random forgeries, skilled forgeries, handwriting recognition, signature verification, invariant properties |
48 | Fuchun Guo, Yi Mu 0001 |
Optimal Online/Offline Signature: How to Sign a Message without Online Computation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, pp. 98-111, 2008, Springer, 978-3-540-88732-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Haifeng Qian, Zhibin Li 0005, Zhijie Chen, Siman Yang |
A Practical Optimal Padding for Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2007, The Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007, Proceedings, pp. 112-128, 2007, Springer, 3-540-69327-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
48 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Wei Wu 0001 |
Universal Designated Verifier Signature Without Delegatability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 479-498, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Universal Designated Verifier Signatures, Non-delegatability, Bilinear Pairings, Designated Verifier Signatures |
48 | Atsuko Miyaji, Kozue Umeda |
A Fully-Functional Group Signature Scheme over Only Known-Order Group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, Second International Conference, ACNS 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings, pp. 164-179, 2004, Springer, 3-540-22217-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
48 | Hongjun Wu 0001, Feng Bao 0001, Robert H. Deng |
Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, Cheju Island, Korea, February 13-15, 2001, Proceedings, pp. 173-179, 2001, Springer, 3-540-41658-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
48 | Hakgene Shin, Jae-Woo Chang |
Combining C-signature with Path Dictionary for Query Processing of Nested Objects in OODBS. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 10th International Conference, DEXA '99, Florence, Italy, August 30 - September 3, 1999, Proceedings, pp. 312-321, 1999, Springer, 3-540-66448-3. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 13353 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|