|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3636 occurrences of 1668 keywords
|
|
|
Results
Found 8730 publication records. Showing 8730 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
108 | Giuseppe Ateniese, Gene Tsudik |
Some Open Issues and New Directions in Group Signatures.  |
Financial Cryptography  |
1999 |
DBLP DOI BibTeX RDF |
Multi-Group Signatures, Sub-Group Signatures, Coalition Attacks, Digital Signatures, Public-key Cryptography, Group Signatures, Revocation |
89 | N. R. Sunitha, B. B. Amberker |
Forward-Secure Multi-signatures.  |
ICDCIT  |
2008 |
DBLP DOI BibTeX RDF |
Serial multi-signature, Parallel multi-signature, Digital Signature, Forward-Security, e-banking, ElGamal Signatures |
83 | Laila El Aimani |
Toward a Generic Construction of Universally Convertible Undeniable Signatures from Pairing-Based Signatures.  |
INDOCRYPT  |
2008 |
DBLP DOI BibTeX RDF |
Pairing-based signatures, Undeniable signatures, Generic construction |
80 | Sherman S. M. Chow |
Real Traceable Signatures.  |
Selected Areas in Cryptography  |
2009 |
DBLP DOI BibTeX RDF |
efficient tracing, anonymity management, group signatures, standard model, bilinear groups, traceable signatures |
79 | Brian J. Matt |
Identification of Multiple Invalid Signatures in Pairing-Based Batched Signatures.  |
Public Key Cryptography  |
2009 |
DBLP DOI BibTeX RDF |
Pairing-based signatures, Wireless networks, Identity-based signatures, Short signatures, Batch verification |
75 | Sherman S. M. Chow, Willy Susilo |
Generic Construction of (Identity-Based) Perfect Concurrent Signatures.  |
ICICS  |
2005 |
DBLP DOI BibTeX RDF |
Perfect Ambiguity, Bilinear Pairing, Fair-Exchange, Ring Signatures, Identity-based Signatures, Concurrent Signatures |
72 | David Galindo, Javier Herranz, Eike Kiltz |
On the Generic Construction of Identity-Based Signatures with Additional Properties.  |
ASIACRYPT  |
2006 |
DBLP DOI BibTeX RDF |
|
72 | Yevgeniy Dodis, Leonid Reyzin |
Breaking and repairing optimistic fair exchange from PODC 2003.  |
Digital Rights Management Workshop  |
2003 |
DBLP DOI BibTeX RDF |
verifiably committed signatures, digital signatures, fair exchange, multisignatures, verifiably encrypted signatures |
70 | Eike Kiltz, Anton Mityagin, Saurabh Panjwani, Barath Raghavan |
Append-Only Signatures.  |
ICALP  |
2005 |
DBLP DOI BibTeX RDF |
Algebraic Signatures, Append-only Signatures, Hierarchical Identity-based Signatures |
69 | Fabien Laguillaumie, Damien Vergnaud |
Multi-designated Verifiers Signatures.  |
ICICS  |
2004 |
DBLP DOI BibTeX RDF |
multi-designated verifiers signatures, privacy of signers identity, bilinear maps, ring signatures, exact security |
69 | Song Han 0004, Elizabeth Chang 0001, Tharam S. Dillon, Jie Wang 0038 |
Improvement of a Convertible Undeniable Partially Blind Signature Scheme.  |
AINA (1)  |
2006 |
DBLP DOI BibTeX RDF |
Partially blind signature, Convertible undeniable signature, Security protocol, Blind signature, Undeniable signature |
67 | Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham |
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps.  |
EUROCRYPT  |
2003 |
DBLP DOI BibTeX RDF |
|
67 | Rosario Gennaro, Hugo Krawczyk, Tal Rabin |
RSA-Based Undeniable Signatures.  |
CRYPTO  |
1997 |
DBLP DOI BibTeX RDF |
|
66 | Guilin Wang |
On the Security of the Li-Hwang-Lee-Tsai Threshold Group Signature Scheme.  |
ICISC  |
2002 |
DBLP DOI BibTeX RDF |
threshold group signatures, threshold-multisignatures, digital signatures, group signatures |
66 | Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 |
Certificate-Based Signatures: New Definitions and a Generic Construction from Certificateless Signatures.  |
WISA  |
2008 |
DBLP DOI BibTeX RDF |
Certificate-based, Security Models, Generic Construction, Certificateless |
64 | Seung Geol Choi, Kunsoo Park, Moti Yung |
Short Traceable Signatures Based on Bilinear Pairings.  |
IWSEC  |
2006 |
DBLP DOI BibTeX RDF |
anonymity, cryptographic protocols, bilinear pairings, group signatures, traceable signatures |
64 | Eric Cronin, Sugih Jamin, Tal Malkin, Patrick D. McDaniel |
On the performance, feasibility, and use of forward-secure signatures.  |
CCS  |
2003 |
DBLP DOI BibTeX RDF |
forward-secure signatures, digital signatures |
63 | Cheng-Kang Chu, Wen-Guey Tzeng |
Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures.  |
ACISP  |
2007 |
DBLP DOI BibTeX RDF |
anonymous signatures, group signatures, ring signatures |
63 | Laila El Aimani |
On Generic Constructions of Designated Confirmer Signatures.  |
INDOCRYPT  |
2009 |
DBLP DOI BibTeX RDF |
Designated Confirmer signatures, Reduction/meta-reduction, Zero Knowledge, Generic construction |
63 | Yaling Zhang, Xiaofeng Wang |
Message Substitute Attack on Concurrent Signatures Protocol and its Improvement.  |
ISECS  |
2008 |
DBLP DOI BibTeX RDF |
Message Substitute Attack, Concurrent Signatures |
63 | Fabien Laguillaumie, Damien Vergnaud |
Time-Selective Convertible Undeniable Signatures.  |
CT-RSA  |
2005 |
DBLP DOI BibTeX RDF |
Convertible undeniable signatures, time-selective conversion, anonymity, bilinear maps, exact security |
62 | Khanh Nguyen |
Asymmetric Concurrent Signatures.  |
ICICS  |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Yuh-Dauh Lyuu, Ming-Luen Wu |
Convertible Group Undeniable Signatures.  |
ICISC  |
2002 |
DBLP DOI BibTeX RDF |
|
60 | Tal Malkin, Satoshi Obana, Moti Yung |
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures.  |
EUROCRYPT  |
2004 |
DBLP DOI BibTeX RDF |
|
59 | Aashish Srivastava |
Electronic signatures: a brief review of the literature.  |
ICEC  |
2006 |
DBLP DOI BibTeX RDF |
lack of acceptance, security, complexity, digital signatures, cost, legislation, electronic signatures, liability |
59 | Steven D. Galbraith, Wenbo Mao |
Invisibility and Anonymity of Undeniable and Confirmer Signatures.  |
CT-RSA  |
2003 |
DBLP DOI BibTeX RDF |
confirmer signatures, anonymity, RSA, Undeniable signatures, invisibility |
57 | Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier 0001, René Rietz |
Systematic Signature Engineering by Re-use of Snort Signatures.  |
ACSAC  |
2008 |
DBLP DOI BibTeX RDF |
|
57 | David Brumley, Hao Wang, Somesh Jha, Dawn Xiaodong Song |
Creating Vulnerability Signatures Using Weakest Preconditions.  |
CSF  |
2007 |
DBLP DOI BibTeX RDF |
|
57 | Tatsuaki Okamoto |
Efficient Blind and Partially Blind Signatures Without Random Oracles.  |
TCC  |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Huafei Zhu, Feng Bao 0001 |
More on Stand-Alone and Setup-Free Verifiably Committed Signatures.  |
ACISP  |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Liqun Chen 0002, Caroline Kudla, Kenneth G. Paterson |
Concurrent Signatures.  |
EUROCRYPT  |
2004 |
DBLP DOI BibTeX RDF |
|
56 | Patrick W. Brown |
Digital Signatures: Can They be Accepted as Legal Signatures in EDI?  |
CCS  |
1993 |
DBLP DOI BibTeX RDF |
distributed systems, cryptography, digital signatures, law, EDI |
56 | Hossein Ghodosi, Josef Pieprzyk |
Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes.  |
ACISP  |
1999 |
DBLP DOI BibTeX RDF |
Cryptography, Digital Signatures, Proxy Signatures, ElGamal signatures |
53 | Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 |
Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.  |
WISA  |
2007 |
DBLP DOI BibTeX RDF |
Security models, Proxy signatures, Undeniable signatures, Security proof, Convertible |
53 | Mohamed Al-Ibrahim, Anton Cerný |
Proxy and Threshold One-Time Signatures.  |
ACNS  |
2003 |
DBLP DOI BibTeX RDF |
digital signatures, group signatures, proxy signature, threshold cryptography, broadcast authentication, One-time signature |
53 | Steven D. Galbraith, Wenbo Mao, Kenneth G. Paterson |
RSA-Based Undeniable Signatures for General Moduli.  |
CT-RSA  |
2002 |
DBLP DOI BibTeX RDF |
RSA-based Undeniable Signatures, Undeniable Signatures |
52 | Alberto Avritzer, Rajanikanth Tanikella, Kiran James, Robert G. Cole, Elaine J. Weyuker |
Monitoring for security intrusion using performance signatures.  |
WOSP/SIPEW  |
2010 |
DBLP DOI BibTeX RDF |
performance signatures, security, measurement, monitoring |
52 | Sebastian Schmerl, Michael Vogel, Hartmut König |
Identifying Modeling Errors in Signatures by Model Checking.  |
SPIN  |
2009 |
DBLP DOI BibTeX RDF |
Attack Signatures, Intrusion Detection, Computer Security, Signature Verification, Misuse Detection, Promela, Spin model checker |
52 | Xiaofeng Chen 0001, Fangguo Zhang, Yi Mu 0001, Willy Susilo |
Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings.  |
Financial Cryptography  |
2006 |
DBLP DOI BibTeX RDF |
Bilinear pairings, Electronic cash, Restrictive partially blind signatures |
52 | Parminder Chhabra, Ajita John, Huzur Saran |
PISA: Automatic Extraction of Traffic Signatures.  |
NETWORKING  |
2005 |
DBLP DOI BibTeX RDF |
Traffic Clusters, Security, Signatures, Worms, DDoS |
52 | Simon So, Clement H. C. Leung |
A New Paradigm in Image Indexing and Retrieval Using Composite Bitplane Signatures.  |
ICMCS, Vol. 1  |
1999 |
DBLP DOI BibTeX RDF |
Composite Bitplane Signatures, Visual Information Systems, Multimedia Databases, Image Indexing and Retrieval |
52 | Fabien Laguillaumie, Damien Vergnaud |
On the Soundness of Restricted Universal Designated Verifier Signatures and Dedicated Signatures.  |
ISC  |
2007 |
DBLP DOI BibTeX RDF |
Universal designated verifier signatures, zero-knowledge proof, Elgamal signatures |
51 | Guilin Wang, Feng Bao 0001, Jianying Zhou 0001 |
The Fairness of Perfect Concurrent Signatures.  |
ICICS  |
2006 |
DBLP DOI BibTeX RDF |
security protocol, fair exchange, Concurrent signature |
51 | Fabien Laguillaumie, Pascal Paillier, Damien Vergnaud |
Universally Convertible Directed Signatures.  |
ASIACRYPT  |
2005 |
DBLP DOI BibTeX RDF |
|
50 | Johannes Buchmann 0001, Luis Carlos Coronado García, Erik Dahmen, Martin Döring, Elena Klintsevich |
CMSS - An Improved Merkle Signature Scheme.  |
INDOCRYPT  |
2006 |
DBLP DOI BibTeX RDF |
Java Cryptography Architecture, Post-Quantum Signatures, Tree Authentication, One-Time-Signatures, Merkle Signatures |
50 | Susan K. Langford |
Weakness in Some Threshold Cryptosystems.  |
CRYPTO  |
1996 |
DBLP DOI BibTeX RDF |
cryptanalysis, digital signatures, secret sharing, undeniable signatures, threshold signatures, Threshold Cryptosystems |
50 | Jan-Hendrik Evertse, Eugène van Heyst |
Which new RSA Signatures can be Computed from RSA Signatures, Obtained in a Specific Interactive Protocol?  |
EUROCRYPT  |
1992 |
DBLP DOI BibTeX RDF |
|
49 | Yongjun Jin |
Driving off a tiger, but leading a wolf: a review of the Chinese contract law art.11.  |
ICEC  |
2005 |
DBLP DOI BibTeX RDF |
data message, writing form, signatures, electronic signatures |
48 | Sebastian Schmerl, Hartmut König, Ulrich Flegel, Michael Meier 0001 |
Simplifying Signature Engineering by Reuse.  |
ETRICS  |
2006 |
DBLP DOI BibTeX RDF |
Attack Signatures, Intrusion Detection, Computer Security, Misuse Detection |
48 | Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini |
Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures.  |
Public Key Cryptography  |
2008 |
DBLP DOI BibTeX RDF |
|
48 | Laurie Law, Brian J. Matt |
Finding Invalid Signatures in Pairing-Based Batches.  |
IMACC  |
2007 |
DBLP DOI BibTeX RDF |
Pairing-based signatures, ID-based signatures, Batch verification |
48 | Jing Xu 0002, Zhenfeng Zhang, Dengguo Feng |
ID-Based Aggregate Signatures from Bilinear Pairings.  |
CANS  |
2005 |
DBLP DOI BibTeX RDF |
bilinear pairings, ID-based signatures, aggregate signatures |
48 | Shaobin Wang, Fan Hong, Xian Zhu |
Optimistic Fair-exchange Protocols Based on DSA Signatures.  |
IEEE SCC  |
2004 |
DBLP DOI BibTeX RDF |
DSA signatures, E-commerce, multi-signatures, Fair-exchange protocols |
48 | Masayuki Abe, Tatsuaki Okamoto |
Provably Secure Partially Blind Signatures.  |
CRYPTO  |
2000 |
DBLP DOI BibTeX RDF |
Partially Blind Signatures, Blind Signatures, Witness Indistinguishability |
48 | Martin Leu |
Relative Signatures for Fault Tolerance and their Implementation.  |
EDCC  |
1994 |
DBLP DOI BibTeX RDF |
relative signatures, relative authentication, fault tolerance, distributed systems, authentication, digital signatures |
47 | Benoît Libert, Jean-Jacques Quisquater |
Practical Time Capsule Signatures in the Standard Model from Bilinear Maps.  |
Pairing  |
2007 |
DBLP DOI BibTeX RDF |
time capsule signatures, standard model, bilinear maps |
47 | Huafei Zhu, Willy Susilo, Yi Mu 0001 |
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures.  |
Public Key Cryptography  |
2007 |
DBLP DOI BibTeX RDF |
setup-free, stand-alone, verifiably committed signatures, multi-party |
47 | HyoJin Yoon, Jung Hee Cheon, Yongdae Kim |
Batch Verifications with ID-Based Signatures.  |
ICISC  |
2004 |
DBLP DOI BibTeX RDF |
ID-based signatures, Batch verifications |
47 | David Naccache, David Pointcheval, Christophe Tymen |
Monotone Signatures.  |
Financial Cryptography  |
2001 |
DBLP BibTeX RDF |
Bank Notes, ID Cards, Digital Signatures, Coercion |
47 | Man Ho Au, Willy Susilo, Yi Mu 0001 |
Is the Notion of Divisible On-Line/Off-Line Signatures Stronger than On-Line/Off-Line Signatures?  |
ProvSec  |
2009 |
DBLP DOI BibTeX RDF |
on-line/off-line signatures, divisible on-line/off-line signatures, OS-EU-CMA, DOS-EU-CMA |
47 | Laurence Bull, Peter Stañski, David Squire |
Content extraction signatures using XML digital signatures and custom transforms on-demand.  |
WWW  |
2003 |
DBLP DOI BibTeX RDF |
Net framework XML signature API, XML signature custom transforms, content extraction signatures, XML signatures, dynamic signature verification |
46 | Chuankun Wu |
Set signatures and their applications.  |
Sci. China Ser. F Inf. Sci.  |
2009 |
DBLP DOI BibTeX RDF |
set signature, cryptography, forward security |
46 | David Brumley, James Newsome, Dawn Song, Hao Wang, Somesh Jha |
Theory and Techniques for Automatic Generation of Vulnerability-Based Signatures.  |
IEEE Trans. Dependable Secur. Comput.  |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Dario Catalano, Mario Di Raimondo, Dario Fiore 0001, Rosario Gennaro |
Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results.  |
Public Key Cryptography  |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen |
Batch Verification of Short Signatures.  |
EUROCRYPT  |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Wei Wu 0001 |
A Generic Construction for Universally-Convertible Undeniable Signatures.  |
CANS  |
2007 |
DBLP DOI BibTeX RDF |
Universally-Convertible, Provable Security, Undeniable Signature, Generic Construction |
46 | Willy Susilo, Yi Mu 0001 |
On the Security of Nominative Signatures.  |
ACISP  |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Aggelos Kiayias, Yiannis Tsiounis, Moti Yung |
Traceable Signatures.  |
EUROCRYPT  |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Antonio Mana, Sonia Matamoros |
Practical Mobile Digital Signatures.  |
EC-Web  |
2002 |
DBLP DOI BibTeX RDF |
|
46 | Chin-Seng Chua, Ray Jarvis |
Point Signatures: A New Representation for 3D Object Recognition.  |
Int. J. Comput. Vis.  |
1997 |
DBLP DOI BibTeX RDF |
model indexing, free-form surface registrataion, feature extraction, pose estimation, 3D object recognition |
44 | Taek-Young Youn, Young-Ho Park 0001, Chang Han Kim, Jongin Lim 0001 |
An Efficient ID-Based Delegation Network.  |
OTM Workshops (1)  |
2006 |
DBLP DOI BibTeX RDF |
Delegation Network, Proxy Signatures, ID-based Signatures |
44 | Lan Nguyen |
Accumulators from Bilinear Pairings and Applications.  |
CT-RSA  |
2005 |
DBLP DOI BibTeX RDF |
membership revocation, privacy, anonymity, group signatures, ring signatures, ID-based, identity escrow, Dynamic accumulators |
44 | Nicolas T. Courtois |
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank.  |
ASIACRYPT  |
2001 |
DBLP DOI BibTeX RDF |
MinRank problem, rank-distance codes, syndrome decoding (SD), identification, NP-complete problems, group signatures, Zero-knowledge, ring signatures, multivariate cryptography, entity authentication |
44 | Marc Joye, Narn-Yih Lee, Tzonelih Hwang |
On the Security of the Lee-Chang Group Signature Scheme and Its Derivatives.  |
ISW  |
1999 |
DBLP DOI BibTeX RDF |
Cryptanalysis, Digital signatures, Group signatures |
43 | Manoj K. Agarwal, Narendran Sachindran, Manish Gupta 0007, Vijay Mann |
Fast Extraction of Adaptive Change Point Based Patterns for Problem Resolution in Enterprise Systems.  |
DSOM  |
2006 |
DBLP DOI BibTeX RDF |
problem signatures, change point detection, patterns, fault localization, adaptive learning |
43 | Laurence Bull, David McG. Squire, Yuliang Zheng 0001 |
A Hierarchical Extraction Policy for content extraction signatures: Selectively handling verifiable digital content.  |
Int. J. Digit. Libr.  |
2004 |
DBLP DOI BibTeX RDF |
Content extraction signatures, XML Signature custom transforms, Selective content disclosure, Hierarchical Extraction Policy, Privacy-enhancing signatures |
43 | Guilin Wang, Feng Bao 0001, Jianying Zhou 0001, Robert H. Deng |
Security Analysis of Some Proxy Signatures.  |
ICISC  |
2003 |
DBLP DOI BibTeX RDF |
Digital signatures, security analysis, proxy signatures |
43 | Mihir Bellare, Gregory Neven |
Transitive Signatures Based on Factoring and RSA.  |
ASIACRYPT  |
2002 |
DBLP DOI BibTeX RDF |
transitive signatures, RSA, Signatures |
43 | Manoj Franklin |
Fast computation of C-MISR signatures.  |
Asian Test Symposium  |
1995 |
DBLP DOI BibTeX RDF |
C-MISR signatures, built-in self-test applications, good circuit signature, faulty circuit signatures, cellular automata-based multi-input signature registers, equivalent single input circuit, VLSI, logic testing, built-in self test, cellular automata, integrated circuit testing, sequential circuits, shift registers, test responses, signature analyzers, equivalent circuits |
42 | Anna Lisa Ferrara, Matthew Green 0001, Susan Hohenberger, Michael Østergaard Pedersen |
Practical Short Signature Batch Verification.  |
CT-RSA  |
2009 |
DBLP DOI BibTeX RDF |
|
42 | Qianhong Wu, Xiaofeng Chen 0001, Changjie Wang, Yumin Wang |
Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group.  |
ISC  |
2004 |
DBLP DOI BibTeX RDF |
|
42 | Hong Han 0003, Xianliang Lu, Jun Lu, Bo Chen, Ren Li Yong |
Data mining aided signature discovery in network-based intrusion detection system.  |
ACM SIGOPS Oper. Syst. Rev.  |
2002 |
DBLP DOI BibTeX RDF |
network-based intrusion detection, signature discovery, data mining, intrusion detection system |
42 | Ivan Damgård, Torben P. Pedersen |
New Convertible Undeniable Signature Schemes.  |
EUROCRYPT  |
1996 |
DBLP DOI BibTeX RDF |
|
42 | Benoît Libert, Moti Yung |
Dynamic fully forward-secure group signatures.  |
AsiaCCS  |
2010 |
DBLP DOI BibTeX RDF |
key protection, anonymity, security modeling, group signatures, forward security, key exposure |
42 | Benoît Libert, Moti Yung |
Efficient Traceable Signatures in the Standard Model.  |
Pairing  |
2009 |
DBLP DOI BibTeX RDF |
anonymity, standard model, Traceable signatures |
42 | Kent Griffin, Scott Schneider 0002, Xin Hu 0001, Tzi-cker Chiueh |
Automatic Generation of String Signatures for Malware Detection.  |
RAID  |
2009 |
DBLP DOI BibTeX RDF |
malware signatures, library function identification, diversity-based heuristics, Markov model, signature generation |
42 | Rui Zhang 0002, Hideki Imai |
Strong Anonymous Signatures.  |
Inscrypt  |
2008 |
DBLP DOI BibTeX RDF |
anonymity, digital signatures |
42 | Jacob C. N. Schuldt, Kanta Matsuura, Kenneth G. Paterson |
Proxy Signatures Secure Against Proxy Key Exposure.  |
Public Key Cryptography  |
2008 |
DBLP DOI BibTeX RDF |
provable security, proxy signatures |
42 | Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 |
Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility.  |
Inscrypt  |
2007 |
DBLP DOI BibTeX RDF |
Provable Security, Undeniable Signatures, Identity-based, Convertible |
42 | Emeline Hufschmitt, Jacques Traoré |
Fair Blind Signatures Revisited.  |
Pairing  |
2007 |
DBLP DOI BibTeX RDF |
Security Model, electronic voting, Blind signatures, Anonymity Revocation |
42 | Xavier Boyen, Hovav Shacham, Emily Shen, Brent Waters |
Forward-secure signatures with untrusted update.  |
CCS  |
2006 |
DBLP DOI BibTeX RDF |
untrusted storage, digital signatures, forward security, two-factor authentication |
42 | Benoît Libert, Jean-Jacques Quisquater, Moti Yung |
Efficient Intrusion-Resilient Signatures Without Random Oracles.  |
Inscrypt  |
2006 |
DBLP DOI BibTeX RDF |
Intrusion-resilience, signatures, standard model, pairings |
42 | Patrick Haffner, Subhabrata Sen, Oliver Spatscheck, Dongmei Wang |
ACAS: automated construction of application signatures.  |
MineNet  |
2005 |
DBLP DOI BibTeX RDF |
application signatures, application-level filter, machine learning |
42 | Seung-Taek Park, David M. Pennock, C. Lee Giles, Robert Krovetz |
Analysis of lexical signatures for improving information persistence on the World Wide Web.  |
ACM Trans. Inf. Syst.  |
2004 |
DBLP DOI BibTeX RDF |
Broken URLs, dead links, lexical signatures, robust hyperlinks, information retrieval, World Wide Web, digital libraries, indexing, search engines, TREC, inverse document frequency, term frequency |
42 | Dan Boneh, Hovav Shacham |
Group signatures with verifier-local revocation.  |
CCS  |
2004 |
DBLP DOI BibTeX RDF |
trusted computing, group signatures, revocation |
42 | Robin Sommer, Vern Paxson |
Enhancing byte-level network intrusion detection signatures with context.  |
CCS  |
2003 |
DBLP DOI BibTeX RDF |
bro, security, evaluation, pattern matching, signatures, network intrusion detection, snort |
42 | Juan A. Garay, Carl Pomerance |
Timed Fair Exchange of Standard Signatures: [Extended Abstract].  |
Financial Cryptography  |
2003 |
DBLP DOI BibTeX RDF |
Timed-release cryptography, timed commitments, blind signatures, contract signing |
42 | Seung-Taek Park, David M. Pennock, C. Lee Giles, Robert Krovetz |
Analysis of lexical signatures for finding lost or related documents.  |
SIGIR  |
2002 |
DBLP DOI BibTeX RDF |
broken URLs, dead links, lexical signatures, robust hyperlinks, information retrieval, world wide web, indexing, search engines, libraries, digital, TREC, inverse document frequency, term frequency |
42 | Anna Lysyanskaya |
Unique Signatures and Verifiable Random Functions from the DH-DDH Separation.  |
CRYPTO  |
2002 |
DBLP DOI BibTeX RDF |
Unique signatures, verifiable random functions, application of groups with DH-DDH separation |
41 | Kristian Gjøsteen, Lillian Kråkmo |
Round-Optimal Blind Signatures from Waters Signatures.  |
ProvSec  |
2008 |
DBLP DOI BibTeX RDF |
Waters signatures, Blind signatures |
Displaying result #1 - #100 of 8730 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|