|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3636 occurrences of 1668 keywords
|
|
|
Results
Found 8730 publication records. Showing 8730 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
108 | Giuseppe Ateniese, Gene Tsudik |
Some Open Issues and New Directions in Group Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings, pp. 196-211, 1999, Springer, 3-540-66362-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Multi-Group Signatures, Sub-Group Signatures, Coalition Attacks, Digital Signatures, Public-key Cryptography, Group Signatures, Revocation |
89 | N. R. Sunitha, B. B. Amberker |
Forward-Secure Multi-signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDCIT ![In: Distributed Computing and Internet Technology, 5th International Conference, ICDCIT 2008, New Delhi, India, December 10-12, 2008. Proceedings, pp. 89-99, 2008, Springer, 978-3-540-89736-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Serial multi-signature, Parallel multi-signature, Digital Signature, Forward-Security, e-banking, ElGamal Signatures |
83 | Laila El Aimani |
Toward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 145-157, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Pairing-based signatures, Undeniable signatures, Generic construction |
80 | Sherman S. M. Chow |
Real Traceable Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Selected Areas in Cryptography ![In: Selected Areas in Cryptography, 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers, pp. 92-107, 2009, Springer, 978-3-642-05443-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
efficient tracing, anonymity management, group signatures, standard model, bilinear groups, traceable signatures |
79 | Brian J. Matt |
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings, pp. 337-356, 2009, Springer, 978-3-642-00467-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Pairing-based signatures, Wireless networks, Identity-based signatures, Short signatures, Batch verification |
75 | Sherman S. M. Chow, Willy Susilo |
Generic Construction of (Identity-Based) Perfect Concurrent Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 194-206, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Perfect Ambiguity, Bilinear Pairing, Fair-Exchange, Ring Signatures, Identity-based Signatures, Concurrent Signatures |
72 | David Galindo, Javier Herranz, Eike Kiltz |
On the Generic Construction of Identity-Based Signatures with Additional Properties. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 178-193, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Yevgeniy Dodis, Leonid Reyzin |
Breaking and repairing optimistic fair exchange from PODC 2003. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Digital Rights Management Workshop ![In: Proceedings of the 2003 ACM workshop on Digital rights management 2003, Washington, DC, USA, October 27, 2003, pp. 47-54, 2003, ACM, 1-58113-786-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
verifiably committed signatures, digital signatures, fair exchange, multisignatures, verifiably encrypted signatures |
70 | Eike Kiltz, Anton Mityagin, Saurabh Panjwani, Barath Raghavan |
Append-Only Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICALP ![In: Automata, Languages and Programming, 32nd International Colloquium, ICALP 2005, Lisbon, Portugal, July 11-15, 2005, Proceedings, pp. 434-445, 2005, Springer, 3-540-27580-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Algebraic Signatures, Append-only Signatures, Hierarchical Identity-based Signatures |
69 | Fabien Laguillaumie, Damien Vergnaud |
Multi-designated Verifiers Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 495-507, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
multi-designated verifiers signatures, privacy of signers identity, bilinear maps, ring signatures, exact security |
69 | Song Han 0004, Elizabeth Chang 0001, Tharam S. Dillon, Jie Wang 0038 |
Improvement of a Convertible Undeniable Partially Blind Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA (1) ![In: 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 18-20 April 2006, Vienna, Austria, pp. 875-882, 2006, IEEE Computer Society, 0-7695-2466-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Partially blind signature, Convertible undeniable signature, Security protocol, Blind signature, Undeniable signature |
67 | Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham |
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp. 416-432, 2003, Springer, 3-540-14039-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
67 | Rosario Gennaro, Hugo Krawczyk, Tal Rabin |
RSA-Based Undeniable Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings, pp. 132-149, 1997, Springer, 3-540-63384-7. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
66 | Guilin Wang |
On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 75-89, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
threshold group signatures, threshold-multisignatures, digital signatures, group signatures |
66 | Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 |
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, pp. 99-114, 2008, Springer, 978-3-642-00305-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Certificate-based, Security Models, Generic Construction, Certificateless |
64 | Seung Geol Choi, Kunsoo Park, Moti Yung |
Short Traceable Signatures Based on Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWSEC ![In: Advances in Information and Computer Security, First International Workshop on Security, IWSEC 2006, Kyoto, Japan, October 23-24, 2006, Proceedings, pp. 88-103, 2006, Springer, 3-540-47699-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
anonymity, cryptographic protocols, bilinear pairings, group signatures, traceable signatures |
64 | Eric Cronin, Sugih Jamin, Tal Malkin, Patrick D. McDaniel |
On the performance, feasibility, and use of forward-secure signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 131-144, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
forward-secure signatures, digital signatures |
63 | Cheng-Kang Chu, Wen-Guey Tzeng |
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 12th Australasian Conference, ACISP 2007, Townsville, Australia, July 2-4, 2007, Proceedings, pp. 323-337, 2007, Springer, 978-3-540-73457-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
anonymous signatures, group signatures, ring signatures |
63 | Laila El Aimani |
On Generic Constructions of Designated Confirmer Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2009, 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009. Proceedings, pp. 343-362, 2009, Springer, 978-3-642-10627-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Designated Confirmer signatures, Reduction/meta-reduction, Zero Knowledge, Generic construction |
63 | Yaling Zhang, Xiaofeng Wang |
Message Substitute Attack on Concurrent Signatures Protocol and its Improvement. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 497-501, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Message Substitute Attack, Concurrent Signatures |
63 | Fabien Laguillaumie, Damien Vergnaud |
Time-Selective Convertible Undeniable Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 154-171, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Convertible undeniable signatures, time-selective conversion, anonymity, bilinear maps, exact security |
62 | Khanh Nguyen |
Asymmetric Concurrent Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 7th International Conference, ICICS 2005, Beijing, China, December 10-13, 2005, Proceedings, pp. 181-193, 2005, Springer, 3-540-30934-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Yuh-Dauh Lyuu, Ming-Luen Wu |
Convertible Group Undeniable Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers, pp. 48-61, 2002, Springer, 3-540-00716-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
60 | Tal Malkin, Satoshi Obana, Moti Yung |
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 306-322, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
59 | Aashish Srivastava |
Electronic signatures: a brief review of the literature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 8th International Conference on Electronic Commerce: The new e-commerce - Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet, 2006, Fredericton, New Brunswick, Canada, August 13-16, 2006, pp. 605-609, 2006, ACM, 1-59593-392-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
lack of acceptance, security, complexity, digital signatures, cost, legislation, electronic signatures, liability |
59 | Steven D. Galbraith, Wenbo Mao |
Invisibility and Anonymity of Undeniable and Confirmer Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2003, The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings, pp. 80-97, 2003, Springer, 3-540-00847-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
confirmer signatures, anonymity, RSA, Undeniable signatures, invisibility |
57 | Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier 0001, René Rietz |
Systematic Signature Engineering by Re-use of Snort Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: Twenty-Fourth Annual Computer Security Applications Conference, ACSAC 2008, Anaheim, California, USA, 8-12 December 2008, pp. 23-32, 2008, IEEE Computer Society, 978-0-7695-3447-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
57 | David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong Song |
Creating Vulnerability Signatures Using Weakest Preconditions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CSF ![In: 20th IEEE Computer Security Foundations Symposium, CSF 2007, 6-8 July 2007, Venice, Italy, pp. 311-325, 2007, IEEE Computer Society, 0-7695-2819-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
57 | Tatsuaki Okamoto |
Efficient Blind and Partially Blind Signatures Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings, pp. 80-99, 2006, Springer, 3-540-32731-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Huafei Zhu, Feng Bao 0001 |
More on Stand-Alone and Setup-Free Verifiably Committed Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 11th Australasian Conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006, Proceedings, pp. 148-158, 2006, Springer, 3-540-35458-1. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Liqun Chen 0002, Caroline Kudla, Kenneth G. Paterson |
Concurrent Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 287-305, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
56 | Patrick W. Brown |
Digital Signatures: Can They be Accepted as Legal Signatures in EDI? ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS '93, Proceedings of the 1st ACM Conference on Computer and Communications Security, Fairfax, Virginia, USA, November 3-5, 1993., pp. 86-92, 1993, ACM, 0-89791-629-8. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
distributed systems, cryptography, digital signatures, law, EDI |
56 | Hossein Ghodosi, Josef Pieprzyk |
Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings, pp. 129-134, 1999, Springer, 3-540-65756-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Cryptography, Digital Signatures, Proxy Signatures, ElGamal signatures |
53 | Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 |
Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 8th International Workshop, WISA 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers, pp. 16-29, 2007, Springer, 978-3-540-77534-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security models, Proxy signatures, Undeniable signatures, Security proof, Convertible |
53 | Mohamed Al-Ibrahim, Anton Cerný |
Proxy and Threshold One-Time Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, pp. 123-136, 2003, Springer, 3-540-20208-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
digital signatures, group signatures, proxy signature, threshold cryptography, broadcast authentication, One-time signature |
53 | Steven D. Galbraith, Wenbo Mao, Kenneth G. Paterson |
RSA-Based Undeniable Signatures for General Moduli. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2002, The Cryptographer's Track at the RSA Conference, 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings, pp. 200-217, 2002, Springer, 3-540-43224-8. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
RSA-based Undeniable Signatures, Undeniable Signatures |
52 | Alberto Avritzer, Rajanikanth Tanikella, Kiran James, Robert G. Cole, Elaine J. Weyuker |
Monitoring for security intrusion using performance signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WOSP/SIPEW ![In: Proceedings of the first joint WOSP/SIPEW International Conference on Performance Engineering, San Jose, California, USA, January 28-30, 2010, pp. 93-104, 2010, ACM, 978-1-60558-563-5. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
performance signatures, security, measurement, monitoring |
52 | Sebastian Schmerl, Michael Vogel, Hartmut König |
Identifying Modeling Errors in Signatures by Model Checking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SPIN ![In: Model Checking Software, 16th International SPIN Workshop, Grenoble, France, June 26-28, 2009. Proceedings, pp. 205-222, 2009, Springer, 978-3-642-02651-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Attack Signatures, Intrusion Detection, Computer Security, Signature Verification, Misuse Detection, Promela, Spin model checker |
52 | Xiaofeng Chen 0001, Fangguo Zhang, Yi Mu 0001, Willy Susilo |
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 10th International Conference, FC 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers, pp. 251-265, 2006, Springer, 3-540-46255-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Bilinear pairings, Electronic cash, Restrictive partially blind signatures |
52 | Parminder Chhabra, Ajita John, Huzur Saran |
PISA: Automatic Extraction of Traffic Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
NETWORKING ![In: NETWORKING 2005: Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems, 4th International IFIP-TC6 Networking Conference, Waterloo, Canada, May 2-6, 2005, Proceedings, pp. 730-742, 2005, Springer, 3-540-25809-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Traffic Clusters, Security, Signatures, Worms, DDoS |
52 | Simon So, Clement H. C. Leung |
A New Paradigm in Image Indexing and Retrieval Using Composite Bitplane Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICMCS, Vol. 1 ![In: IEEE International Conference on Multimedia Computing and Systems, ICMCS 1999, Florence, Italy, June 7-11, 1999. Volume I, pp. 855-859, 1999, IEEE Computer Society, 0-7695-0253-9. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Composite Bitplane Signatures, Visual Information Systems, Multimedia Databases, Image Indexing and Retrieval |
52 | Fabien Laguillaumie, Damien Vergnaud |
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 10th International Conference, ISC 2007, Valparaíso, Chile, October 9-12, 2007, Proceedings, pp. 175-188, 2007, Springer, 978-3-540-75495-4. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Universal designated verifier signatures, zero-knowledge proof, Elgamal signatures |
51 | Guilin Wang, Feng Bao 0001, Jianying Zhou 0001 |
The Fairness of Perfect Concurrent Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 8th International Conference, ICICS 2006, Raleigh, NC, USA, December 4-7, 2006, Proceedings, pp. 435-451, 2006, Springer, 3-540-49496-0. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
security protocol, fair exchange, Concurrent signature |
51 | Fabien Laguillaumie, Pascal Paillier, Damien Vergnaud |
Universally Convertible Directed Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings, pp. 682-701, 2005, Springer, 3-540-30684-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Johannes Buchmann 0001, Luis Carlos Coronado García, Erik Dahmen, Martin Döring, Elena Klintsevich |
CMSS - An Improved Merkle Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2006, 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings, pp. 349-363, 2006, Springer, 3-540-49767-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Java Cryptography Architecture, Post-Quantum Signatures, Tree Authentication, One-Time-Signatures, Merkle Signatures |
50 | Susan K. Langford |
Weakness in Some Threshold Cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 74-82, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signatures, secret sharing, undeniable signatures, threshold signatures, Threshold Cryptosystems |
50 | Jan-Hendrik Evertse, Eugène van Heyst |
Which new RSA Signatures can be Computed from RSA Signatures, Obtained in a Specific Interactive Protocol? ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '92, Workshop on the Theory and Application of of Cryptographic Techniques, Balatonfüred, Hungary, May 24-28, 1992, Proceedings, pp. 378-389, 1992, Springer, 3-540-56413-6. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
49 | Yongjun Jin |
Driving off a tiger, but leading a wolf: a review of the Chinese contract law art.11. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEC ![In: Proceedings of the 7th International Conference on Electronic Commerce, ICEC 2005, Xi'an, China, August 15-17, 2005, pp. 711-716, 2005, ACM, 1-59593-112-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
data message, writing form, signatures, electronic signatures |
48 | Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier 0001 |
Simplifying Signature Engineering by Reuse. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ETRICS ![In: Emerging Trends in Information and Communication Security, International Conference, ETRICS 2006, Freiburg, Germany, June 6-9, 2006, Proceedings, pp. 436-450, 2006, Springer, 3-540-34640-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Attack Signatures, Intrusion Detection, Computer Security, Misuse Detection |
48 | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini |
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings, pp. 121-140, 2008, Springer, 978-3-540-78439-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Laurie Law, Brian J. Matt |
Finding Invalid Signatures in Pairing-Based Batches. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMACC ![In: Cryptography and Coding, 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings, pp. 34-53, 2007, Springer, 978-3-540-77271-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Pairing-based signatures, ID-based signatures, Batch verification |
48 | Jing Xu 0002, Zhenfeng Zhang, Dengguo Feng |
ID-Based Aggregate Signatures from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 4th International Conference, CANS 2005, Xiamen, China, December 14-16, 2005, Proceedings, pp. 110-119, 2005, Springer, 3-540-30849-0. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
bilinear pairings, ID-based signatures, aggregate signatures |
48 | Shaobin Wang, Fan Hong, Xian Zhu |
Optimistic Fair-exchange Protocols Based on DSA Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE SCC ![In: 2004 IEEE International Conference on Services Computing (SCC 2004), 15-18 September 2004, Shanghai, China, pp. 498-501, 2004, IEEE Computer Society, 0-7695-2225-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
DSA signatures, E-commerce, multi-signatures, Fair-exchange protocols |
48 | Masayuki Abe, Tatsuaki Okamoto |
Provably Secure Partially Blind Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2000, 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000, Proceedings, pp. 271-286, 2000, Springer, 3-540-67907-3. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
Partially Blind Signatures, Blind Signatures, Witness Indistinguishability |
48 | Martin Leu |
Relative Signatures for Fault Tolerance and their Implementation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDCC ![In: Dependable Computing - EDCC-1, First European Dependable Computing Conference, Berlin, Germany, October 4-6, 1994, Proceedings, pp. 563-580, 1994, Springer, 3-540-58426-9. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
relative signatures, relative authentication, fault tolerance, distributed systems, authentication, digital signatures |
47 | Benoît Libert, Jean-Jacques Quisquater |
Practical Time Capsule Signatures in the Standard Model from Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings, pp. 23-38, 2007, Springer, 978-3-540-73488-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
time capsule signatures, standard model, bilinear maps |
47 | Huafei Zhu, Willy Susilo, Yi Mu 0001 |
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 134-149, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
setup-free, stand-alone, verifiably committed signatures, multi-party |
47 | HyoJin Yoon, Jung Hee Cheon, Yongdae Kim |
Batch Verifications with ID-Based Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers, pp. 233-248, 2004, Springer, 3-540-26226-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
ID-based signatures, Batch verifications |
47 | David Naccache, David Pointcheval, Christophe Tymen |
Monotone Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 5th International Conference, FC 2001, Grand Cayman, British West Indies, February 19-22, 2002, Proceedings, pp. 295-308, 2001, Springer, 3-540-44079-8. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP BibTeX RDF |
Bank Notes, ID Cards, Digital Signatures, Coercion |
47 | Man Ho Au, Willy Susilo, Yi Mu 0001 |
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures? ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 129-139, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
on-line/off-line signatures, divisible on-line/off-line signatures, OS-EU-CMA, DOS-EU-CMA |
47 | Laurence Bull, Peter Stañski, David Squire |
Content extraction signatures using XML digital signatures and custom transforms on-demand. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WWW ![In: Proceedings of the Twelfth International World Wide Web Conference, WWW 2003, Budapest, Hungary, May 20-24, 2003, pp. 170-177, 2003, ACM, 1-58113-680-3. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Net framework XML signature API, XML signature custom transforms, content extraction signatures, XML signatures, dynamic signature verification |
46 | Chuankun Wu |
Set signatures and their applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Sci. China Ser. F Inf. Sci. ![In: Sci. China Ser. F Inf. Sci. 52(8), pp. 1346-1357, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
set signature, cryptography, forward security |
46 | David Brumley, James Newsome, Dawn Song, Hao Wang, Somesh Jha |
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Dependable Secur. Comput. ![In: IEEE Trans. Dependable Secur. Comput. 5(4), pp. 224-241, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Dario Catalano, Mario Di Raimondo, Dario Fiore 0001, Rosario Gennaro |
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings, pp. 101-120, 2008, Springer, 978-3-540-78439-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen |
Batch Verification of Short Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings, pp. 246-263, 2007, Springer, 978-3-540-72539-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Wei Wu 0001 |
A Generic Construction for Universally-Convertible Undeniable Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 6th International Conference, CANS 2007, Singapore, December 8-10, 2007, Proceedings, pp. 15-33, 2007, Springer, 978-3-540-76968-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Universally-Convertible, Provable Security, Undeniable Signature, Generic Construction |
46 | Willy Susilo, Yi Mu 0001 |
On the Security of Nominative Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings, pp. 329-335, 2005, Springer, 3-540-26547-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Aggelos Kiayias, Yiannis Tsiounis, Moti Yung |
Traceable Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings, pp. 571-589, 2004, Springer, 3-540-21935-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Antonio Mana, Sonia Matamoros |
Practical Mobile Digital Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EC-Web ![In: E-Commerce and Web Technologies, Third International Conference, EC-Web 2002, Aix-en-Provence, France, September 2-6, 2002, Proceedings, pp. 224-233, 2002, Springer, 3-540-44137-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
46 | Chin-Seng Chua, Ray Jarvis |
Point Signatures: A New Representation for 3D Object Recognition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Comput. Vis. ![In: Int. J. Comput. Vis. 25(1), pp. 63-85, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
model indexing, free-form surface registrataion, feature extraction, pose estimation, 3D object recognition |
44 | Taek-Young Youn, Young-Ho Park 0001, Chang Han Kim, Jongin Lim 0001 |
An Efficient ID-Based Delegation Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
OTM Workshops (1) ![In: On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops, OTM Confederated International Workshops and Posters, AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET, OnToContent, ORM, PerSys, OTM Academy Doctoral Consortium, RDDS, SWWS, and SeBGIS 2006, Montpellier, France, October 29 - November 3, 2006. Proceedings, Part I, pp. 382-391, 2006, Springer, 3-540-48269-5. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Delegation Network, Proxy Signatures, ID-based Signatures |
44 | Lan Nguyen |
Accumulators from Bilinear Pairings and Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2005, The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings, pp. 275-292, 2005, Springer, 3-540-24399-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
membership revocation, privacy, anonymity, group signatures, ring signatures, ID-based, identity escrow, Dynamic accumulators |
44 | Nicolas T. Courtois |
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001, Proceedings, pp. 402-421, 2001, Springer, 3-540-42987-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
MinRank problem, rank-distance codes, syndrome decoding (SD), identification, NP-complete problems, group signatures, Zero-knowledge, ring signatures, multivariate cryptography, entity authentication |
44 | Marc Joye, Narn-Yih Lee, Tzonelih Hwang |
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 47-51, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Digital signatures, Group signatures |
43 | Manoj K. Agarwal, Narendran Sachindran, Manish Gupta 0007, Vijay Mann |
Fast Extraction of Adaptive Change Point Based Patterns for Problem Resolution in Enterprise Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DSOM ![In: Large Scale Management of Distributed Systems, 17th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management, DSOM 2006, Dublin, Ireland, October 23-25, 2006, Proceedings, pp. 161-172, 2006, Springer, 3-540-47659-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
problem signatures, change point detection, patterns, fault localization, adaptive learning |
43 | Laurence Bull, David McG. Squire, Yuliang Zheng 0001 |
A Hierarchical Extraction Policy for content extraction signatures: Selectively handling verifiable digital content. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Digit. Libr. ![In: Int. J. Digit. Libr. 4(3), pp. 208-222, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Content extraction signatures, XML Signature custom transforms, Selective content disclosure, Hierarchical Extraction Policy, Privacy-enhancing signatures |
43 | Guilin Wang, Feng Bao 0001, Jianying Zhou 0001, Robert H. Deng |
Security Analysis of Some Proxy Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2003, 6th International Conference, Seoul, Korea, November 27-28, 2003, Revised Papers, pp. 305-319, 2003, Springer, 3-540-21376-7. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Digital signatures, security analysis, proxy signatures |
43 | Mihir Bellare, Gregory Neven |
Transitive Signatures Based on Factoring and RSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, pp. 397-414, 2002, Springer, 3-540-00171-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
transitive signatures, RSA, Signatures |
43 | Manoj Franklin |
Fast computation of C-MISR signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asian Test Symposium ![In: 4th Asian Test Symposium (ATS '95), November 23-24, 1995. Bangalore, India, pp. 293-297, 1995, IEEE Computer Society, 0-8186-7129-7. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
C-MISR signatures, built-in self-test applications, good circuit signature, faulty circuit signatures, cellular automata-based multi-input signature registers, equivalent single input circuit, VLSI, logic testing, built-in self test, cellular automata, integrated circuit testing, sequential circuits, shift registers, test responses, signature analyzers, equivalent circuits |
42 | Anna Lisa Ferrara, Matthew Green 0001, Susan Hohenberger, Michael Østergaard Pedersen |
Practical Short Signature Batch Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 309-324, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Qianhong Wu, Xiaofeng Chen 0001, Changjie Wang, Yumin Wang |
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings, pp. 330-341, 2004, Springer, 3-540-23208-7. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Hong Han 0003, Xianliang Lu, Jun Lu, Bo Chen, Ren Li Yong |
Data mining aided signature discovery in network-based intrusion detection system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 36(4), pp. 7-13, 2002. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
network-based intrusion detection, signature discovery, data mining, intrusion detection system |
42 | Ivan Damgård, Torben P. Pedersen |
New Convertible Undeniable Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding, pp. 372-386, 1996, Springer, 3-540-61186-X. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
42 | Benoît Libert, Moti Yung |
Dynamic fully forward-secure group signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AsiaCCS ![In: Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2010, Beijing, China, April 13-16, 2010, pp. 70-81, 2010, ACM, 978-1-60558-936-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
key protection, anonymity, security modeling, group signatures, forward security, key exposure |
42 | Benoît Libert, Moti Yung |
Efficient Traceable Signatures in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2009, Third International Conference, Palo Alto, CA, USA, August 12-14, 2009, Proceedings, pp. 187-205, 2009, Springer, 978-3-642-03297-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymity, standard model, Traceable signatures |
42 | Kent Griffin, Scott Schneider 0002, Xin Hu 0001, Tzi-cker Chiueh |
Automatic Generation of String Signatures for Malware Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
RAID ![In: Recent Advances in Intrusion Detection, 12th International Symposium, RAID 2009, Saint-Malo, France, September 23-25, 2009. Proceedings, pp. 101-120, 2009, Springer, 978-3-642-04341-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
malware signatures, library function identification, diversity-based heuristics, Markov model, signature generation |
42 | Rui Zhang 0002, Hideki Imai |
Strong Anonymous Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers, pp. 60-71, 2008, Springer, 978-3-642-01439-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
anonymity, digital signatures |
42 | Jacob C. N. Schuldt, Kanta Matsuura, Kenneth G. Paterson |
Proxy Signatures Secure Against Proxy Key Exposure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings, pp. 141-161, 2008, Springer, 978-3-540-78439-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
provable security, proxy signatures |
42 | Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 |
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 25-39, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Provable Security, Undeniable Signatures, Identity-based, Convertible |
42 | Emeline Hufschmitt, Jacques Traoré |
Fair Blind Signatures Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings, pp. 268-292, 2007, Springer, 978-3-540-73488-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Security Model, electronic voting, Blind signatures, Anonymity Revocation |
42 | Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters |
Forward-secure signatures with untrusted update. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, October 30 - November 3, 2006, pp. 191-200, 2006, ACM. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
untrusted storage, digital signatures, forward security, two-factor authentication |
42 | Benoît Libert, Jean-Jacques Quisquater, Moti Yung |
Efficient Intrusion-Resilient Signatures Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Second SKLOIS Conference, Inscrypt 2006, Beijing, China, November 29 - December 1, 2006, Proceedings, pp. 27-41, 2006, Springer, 3-540-49608-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Intrusion-resilience, signatures, standard model, pairings |
42 | Patrick Haffner, Subhabrata Sen, Oliver Spatscheck, Dongmei Wang |
ACAS: automated construction of application signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MineNet ![In: Proceedings of the 1st Annual ACM Workshop on Mining Network Data, MineNet 2005, Philadelphia, Pennsylvania, USA, August 26, 2005, pp. 197-202, 2005, ACM, 1-59593-026-4. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
application signatures, application-level filter, machine learning |
42 | Seung-Taek Park, David M. Pennock, C. Lee Giles, Robert Krovetz |
Analysis of lexical signatures for improving information persistence on the World Wide Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. ![In: ACM Trans. Inf. Syst. 22(4), pp. 540-572, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
Broken URLs, dead links, lexical signatures, robust hyperlinks, information retrieval, World Wide Web, digital libraries, indexing, search engines, TREC, inverse document frequency, term frequency |
42 | Dan Boneh, Hovav Shacham |
Group signatures with verifier-local revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 168-177, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
trusted computing, group signatures, revocation |
42 | Robin Sommer, Vern Paxson |
Enhancing byte-level network intrusion detection signatures with context. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 10th ACM Conference on Computer and Communications Security, CCS 2003, Washington, DC, USA, October 27-30, 2003, pp. 262-271, 2003, ACM, 1-58113-738-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
bro, security, evaluation, pattern matching, signatures, network intrusion detection, snort |
42 | Juan A. Garay, Carl Pomerance |
Timed Fair Exchange of Standard Signatures: [Extended Abstract]. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography, 7th International Conference, FC 2003, Guadeloupe, French West Indies, January 27-30, 2003, Revised Papers, pp. 190-207, 2003, Springer, 3-540-40663-8. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Timed-release cryptography, timed commitments, blind signatures, contract signing |
42 | Seung-Taek Park, David M. Pennock, C. Lee Giles, Robert Krovetz |
Analysis of lexical signatures for finding lost or related documents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIGIR ![In: SIGIR 2002: Proceedings of the 25th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, August 11-15, 2002, Tampere, Finland, pp. 11-18, 2002, ACM, 1-58113-561-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
broken URLs, dead links, lexical signatures, robust hyperlinks, information retrieval, world wide web, indexing, search engines, libraries, digital, TREC, inverse document frequency, term frequency |
42 | Anna Lysyanskaya |
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 597-612, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Unique signatures, verifiable random functions, application of groups with DH-DDH separation |
41 | Kristian Gjøsteen, Lillian Kråkmo |
Round-Optimal Blind Signatures from Waters Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, pp. 112-126, 2008, Springer, 978-3-540-88732-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Waters signatures, Blind signatures |
Displaying result #1 - #100 of 8730 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|