The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for unforgeability with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1991-2003 (17) 2004-2005 (27) 2006 (15) 2007 (23) 2008 (27) 2009 (20) 2010-2017 (16) 2018-2021 (17) 2023 (1)
Publication types (Num. hits)
article(31) inproceedings(132)
Venues (Conferences, Journals, ...)
IACR Cryptol. ePrint Arch.(9) CT-RSA(8) Public Key Cryptography(6) Inscrypt(5) ProvSec(5) SCN(5) ASIACRYPT(4) CRYPTO(4) J. Cryptol.(4) ATC(3) EUROCRYPT(3) ICYCS(3) INDOCRYPT(3) ISC(3) WISA(3) ACISP(2) More (+10 of total 90)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 168 occurrences of 81 keywords

Results
Found 163 publication records. Showing 163 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
86Peng Wang 0009, Dengguo Feng, Changlu Lin, Wenling Wu Security of Truncated MACs. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Robust unforgeability, Message authentication code, Universal hash function, Unforgeability, Unpredictability
63Kazuki Yoneyama, Kazuo Ohta Ring signatures: universally composable definitions and constructions. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF anonymity, ring signature, universal composability, unforgeability
59Qiong Huang 0001, Duncan S. Wong, Jin Li 0002, Yiming Zhao Generic Transformation from Weakly to Strongly Unforgeable Signatures. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF weak unforgeability, signature, one-time signature, strong unforgeability
54Kaoru Kurosawa, Swee-Huay Heng Relations Among Security Notions for Undeniable Signature Schemes. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF security notions, factoring assumption, composite decision Diffie-Hellman assumption, Undeniable signature
50Jianhong Zhang, Xue Liu An Efficient Strong ID-Based Signature Scheme with Unforgeability. Search on Bibsonomy FCST The full citation details ... 2010 DBLP  DOI  BibTeX  RDF the CDH problem, ID-base cryptography, security proof, ID-based signature, strong unforgeability
45Cynthia Dwork, Moni Naor An Efficient Existentially Unforgeable Signature Scheme and Its Applications. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF One-way hash mbox{functions}, One-way hash mbox{functions}, Authentication, Authentication, Cryptography, Cryptography, Digital signatures, Digital signatures, Key words, Unforgeability, Unforgeability
40Markus Rückert, Dominique Schröder Security of Verifiably Encrypted Signatures and a Construction without Random Oracles. Search on Bibsonomy Pairing The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
36Mingwu Zhang, Yusheng Zhong, Bo Yang 0003, Wenzheng Zhang Analysis and Improvement of an ID-Based Anonymous Signcryption Model. Search on Bibsonomy ICIC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymous signcryption, anonymity, bilinear pairings, unforgeability
36Shengli Liu 0001, Xiaofeng Chen 0001, Fangguo Zhang Forgeability of Wang-Tang-Li's ID-Based Restrictive Partially Blind Signature Scheme. Search on Bibsonomy J. Comput. Sci. Technol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF ID-based cryptography, electronic cash, unforgeability, restrictive partially blind signature
36Mingwu Zhang, Bo Yang 0003, Shenglin Zhu, Wenzheng Zhang Efficient Secret Authenticatable Anonymous Signcryption Scheme with Identity Privacy. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF anonymity, signcryption, ring signature, unforgeability
36Zuhua Shao Self-certified Signatures Based on Discrete Logarithms. Search on Bibsonomy WAIFI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Self-certified public key signature, Discrete logarithm, strong unforgeability
36Takahiro Matsuda 0002, Nuttapong Attrapadung, Goichiro Hanaoka, Kanta Matsuura, Hideki Imai A CDH-Based Strongly Unforgeable Signature Without Collision Resistant Hash Function. Search on Bibsonomy ProvSec The full citation details ... 2007 DBLP  DOI  BibTeX  RDF target collision resistant hash function, digital signature, standard model, strong unforgeability
28Teodora Baluta, Ivica Nikolic, Racchit Jain, Divesh Aggarwal, Prateek Saxena Unforgeability in Stochastic Gradient Descent. Search on Bibsonomy CCS The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
28Jason Chia, Ji-Jian Chin, Sook-Chin Yip Digital signature schemes with strong existential unforgeability. Search on Bibsonomy F1000Research The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Junli Fang 0001, Tao Feng 0007 Group signature with time-bound keys and unforgeability of expiry time for smart cities. Search on Bibsonomy EURASIP J. Wirel. Commun. Netw. The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Mina Doosti, Mahshid Delavar, Elham Kashefi, Myrto Arapinis A Unified Framework For Quantum Unforgeability. Search on Bibsonomy CoRR The full citation details ... 2021 DBLP  BibTeX  RDF
28Xianrui Qin, Cailing Cai, Tsz Hon Yuen One-more Unforgeability of Blind ECDSA. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2021 DBLP  BibTeX  RDF
28François Dupressoir, Sara Zain Machine-Checking Unforgeability Proofs for Signature Schemes with Tight Reductions to the Computational Diffie-Hellman Problem. Search on Bibsonomy CSF The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Xianrui Qin, Cailing Cai, Tsz Hon Yuen One-More Unforgeability of Blind ECDSA. Search on Bibsonomy ESORICS (2) The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Cas Cremers, Samed Düzlü, Rune Fiedler, Marc Fischlin, Christian Janson BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures. Search on Bibsonomy SP The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
28Britta Hale User-mediated authentication protocols and unforgeability in key collision. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Xiaoguo Li, Tao Xiang 0001, Peng Wang Achieving forward unforgeability in keyword-field-free conjunctive search. Search on Bibsonomy J. Netw. Comput. Appl. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28 Unforgeability in the quantum world. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
28Cas Cremers, Samed Düzlü, Rune Fiedler, Marc Fischlin, Christian Janson BUFFing signature schemes beyond unforgeability and the case of post-quantum signatures. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
28Gorjan Alagic, Christian Majenz, Alexander Russell, Fang Song 0001 Quantum-Access-Secure Message Authentication via Blind-Unforgeability. Search on Bibsonomy EUROCRYPT (3) The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
28Kazuki Yoneyama Formal modeling of random oracle programmability and verification of signature unforgeability using task-PIOAs. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Gorjan Alagic, Christian Majenz, Alexander Russell, Fang Song 0001 Quantum-secure message authentication via blind-unforgeability. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
28Gorjan Alagic, Christian Majenz, Alexander Russell, Fang Song 0001 Quantum-secure message authentication via blind-unforgeability. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
28Xia Yang, Xingping Sheng, Mian Zhang A certificateless signature scheme with strong unforgeability in the random oracle model. Search on Bibsonomy J. Comput. Methods Sci. Eng. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Britta Hale User-Mediated Authentication Protocols and Unforgeability in Key Collision. Search on Bibsonomy ProvSec The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
28Manuel Fersch, Eike Kiltz, Bertram Poettering On the One-Per-Message Unforgeability of (EC)DSA and its Variants. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2017 DBLP  BibTeX  RDF
28Manuel Fersch, Eike Kiltz, Bertram Poettering On the One-Per-Message Unforgeability of (EC)DSA and Its Variants. Search on Bibsonomy TCC (2) The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
28Tapas Pandit, Sumit Kumar Pandey, Rana Barua Attribute-Based Signcryption: Signer Privacy, Strong Unforgeability and IND-CCA Security in Adaptive-Predicates Model (Extended Version). Search on Bibsonomy J. Internet Serv. Inf. Secur. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
28Tapas Pandit, Sumit Kumar Pandey, Rana Barua Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
28Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva PUDA - Privacy and Unforgeability for Data Aggregation. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2015 DBLP  BibTeX  RDF
28Ying-Hao Hung, Sen-Shan Huang, Yuh-Min Tseng, Tung-Tso Tsai Certificateless Signature with Strong Unforgeability in the Standard Model. Search on Bibsonomy Informatica The full citation details ... 2015 DBLP  BibTeX  RDF
28Iraklis Leontiadis, Kaoutar Elkhiyaoui, Melek Önen, Refik Molva PUDA - Privacy and Unforgeability for Data Aggregation. Search on Bibsonomy CANS The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
28Chaowen Guan, Jian Weng 0001, Robert H. Deng, Min-Rong Chen, Dehua Zhou Unforgeability of an improved certificateless signature scheme in the standard model. Search on Bibsonomy IET Inf. Secur. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Jinshu Su, Dan Cao, Baokang Zhao, Xiaofeng Wang 0002, Ilsun You ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things. Search on Bibsonomy Future Gener. Comput. Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Ryotaro Hayashi 0001, Tatsuyuki Matsushita A Proxy Re-Encryption Scheme with the Unforgeability of Re-Encryption Keys against Collusion Attacks. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
28Georg Fuchsbauer Breaking Existential Unforgeability of a Signature Scheme from Asiacrypt 2014. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
28Kazuki Yoneyama Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs. Search on Bibsonomy ICISC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Tapas Pandit, Sumit Kumar Pandey, Rana Barua Attribute-Based Signcryption : Signer Privacy, Strong Unforgeability and IND-CCA2 Security in Adaptive-Predicates Attack. Search on Bibsonomy ProvSec The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
28Ryotaro Hayashi 0001, Tatsuyuki Matsushita, Takuya Yoshida, Yoshihiro Fujii, Koji Okada Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption. Search on Bibsonomy IWSEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
28Haeryong Park, Seongan Lim, Ikkwon Yie, Kitae Kim, Junghwan Song Strong unforgeability in group signature schemes. Search on Bibsonomy Comput. Stand. Interfaces The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
28Jianhong Zhang A verifiably encrypted signature scheme with strong unforgeability. Search on Bibsonomy Infoscale The full citation details ... 2007 DBLP  DOI  BibTeX  RDF security analysis, proof, verifiably encryption
27Christina Brzuska, Marc Fischlin, Tobias Freudenreich, Anja Lehmann, Marcus Page, Jakob Schelbert, Dominique Schröder, Florian Volk Security of Sanitizable Signatures Revisited. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
27Takahiro Matsuda 0002, Kanta Matsuura, Jacob C. N. Schuldt Efficient Constructions of Signcryption Schemes and Signcryption Composability. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF multi-user security, signcryption, generic construction
27Norio Akagi, Yoshifumi Manabe, Tatsuaki Okamoto An Efficient Anonymous Credential System. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
27S. Sharmila Deva Selvi, S. Sree Vivek, Ragavendran Gopalakrishnan, Naga Naresh Karuturi, C. Pandu Rangan Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Cryptanalysis, Provable Security, Bilinear Pairing, Broadcast Encryption, Signcryption, Random Oracle, ID-based Cryptosystem
27Zhenchao Zhu, Yuqing Zhang, Fengjiao Wang The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF provably secure, signcryption, Identity based cryptography
27Joonsang Baek, Ron Steinfeld, Yuliang Zheng 0001 Formal Proofs for the Security of Signcryption. Search on Bibsonomy J. Cryptol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Emeline Hufschmitt, Jacques Traoré Fair Blind Signatures Revisited. Search on Bibsonomy Pairing The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Security Model, electronic voting, Blind signatures, Anonymity Revocation
27Haeryong Park, Seongan Lim, Ikkwon Yie, Hyun Kim, Kilsoo Chun, Jaeil Lee An Information Aggregation Scheme of Multi-node in Ubiquitous Sensor Networks. Search on Bibsonomy ISPA Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature. Search on Bibsonomy CT-RSA The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
27David A. Wagner 0001 Object capabilities for security. Search on Bibsonomy PLAS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
27Jiqiang Lu Security Weaknesses in Two Proxy Signature Schemes. Search on Bibsonomy ICCSA (3) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Public key cryptology, Proxy signature, Forgery attack
27Jee Hea An, Mihir Bellare Constructing VIL-MACsfrom FIL-MACs: Message Authentication under Weakened Assumptions. Search on Bibsonomy CRYPTO The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
23Dan Cao, Baokang Zhao, Xiaofeng Wang 0002, Jinshu Su, Yijiao Chen Authenticating with Attributes in Online Social Networks. Search on Bibsonomy NBiS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF OSN, privacy, predicate, unforgeability, ABS
23Kan Yasuda A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier. Search on Bibsonomy EUROCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF birthday bound, MAC, message authentication code, unforgeability, unpredictability, domain extension
23Dan Boneh, Xavier Boyen Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups. Search on Bibsonomy J. Cryptol. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Digital signatures, Bilinear pairings, Standard model, Strong unforgeability
23Jin Li 0002, Kwangjo Kim, Fangguo Zhang, Duncan S. Wong Generic Security-Amplifying Methods of Ordinary Digital Signatures. Search on Bibsonomy ACNS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Weak Chosen Message Attack, q-SDH Assumption, Signature, Strong-RSA Assumption, Strong Unforgeability
23Jun Shao, Zhenfu Cao, Licheng Wang, Xiaohui Liang Proxy Re-signature Schemes Without Random Oracles. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF proxy re-signature, existential unforgeability, standard model, bilinear maps, ID-based
13Adam Bender, Jonathan Katz, Ruggero Morselli Ring Signatures: Stronger Definitions, and Constructions without Random Oracles. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Anonymity, Signatures
13Xiaohui Liang, Zhenfu Cao, Huang Lin, Dongsheng Xing Provably secure and efficient bounded ciphertext policy attribute based encryption. Search on Bibsonomy AsiaCCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF access control, public key cryptography, attribute based encryption
13Watcharee Tantikittipisut, Nol Premasathian Strongly Unforgeable Signature Scheme without One-Time Key. Search on Bibsonomy ACIS-ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Gilles Barthe, Benjamin Grégoire, Santiago Zanella Béguelin Formal certification of code-based cryptographic proofs. Search on Bibsonomy POPL The full citation details ... 2009 DBLP  DOI  BibTeX  RDF cryptographic proofs, relational hoare logic, program transformations, observational equivalence, coq proof assistant
13Jianhong Zhang, Shengnan Gao, Hua Chen, Qin Geng A Novel ID-Based Anonymous Signcryption Scheme. Search on Bibsonomy APWeb/WAIM The full citation details ... 2009 DBLP  DOI  BibTeX  RDF anonymous signcryption, ID-based ring signature, security proof
13Jianhong Zhang, Yixian Yang, Xinxin Niu Efficient Provable Secure ID-Based Directed Signature Scheme without Random Oracle. Search on Bibsonomy ISNN (3) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Directed signature, CDH problem, DBDH problem, Standard model, ID-based
13Bo Zhang 0020, Qiuliang Xu Certificateless Proxy Blind Signature Scheme from Bilinear Pairings. Search on Bibsonomy WKDD The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Mohsen Toorani, Ali Asghar Beheshti Shirazi A directly public verifiable signcryption scheme based on elliptic curves. Search on Bibsonomy ISCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Marc Fischlin, Dominique Schröder Security of Blind Signatures under Aborts. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Qingshui Xue, Fengying Li, Yuan Zhou 0008, Jiping Zhang 0001, Zhenfu Cao, Haifeng Qian An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System. Search on Bibsonomy MobiSec The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Dalia Khader, Liqun Chen 0002, James H. Davenport Certificate-Free Attribute Authentication. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Julien Cathalo, David Naccache, Jean-Jacques Quisquater Comparing with RSA. Search on Bibsonomy IMACC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Santiago Zanella Béguelin, Gilles Barthe, Benjamin Grégoire, Federico Olmedo Formally Certifying the Security of Digital Signature Schemes. Search on Bibsonomy SP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Xiangxi Li, Yu Zhang, Yuxin Deng Verifying Anonymous Credential Systems in Applied Pi Calculus. Search on Bibsonomy CANS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Fagen Li, Masaaki Shirase, Tsuyoshi Takagi Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF identity-based signcryption, multi-PKG, Ad hoc networks, provable security, bilinear pairings
13Huaqun Wang, Hong Yu Cryptanalysis of Two Ring Signcryption Schemes. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ring signcryption, privacy and trust, cryptanalysis, certificateless cryptography
13Fagen Li, Masaaki Shirase, Tsuyoshi Takagi Efficient Signcryption Key Encapsulation without Random Oracles. Search on Bibsonomy Inscrypt The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Hybrid signcryption, KEM, tag-KEM, standard model
13Giovanni Di Crescenzo On the Security of Beth's Identification Schemes against Active and Concurrent Adversaries. Search on Bibsonomy MMICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Xiaodong Lin 0001, Rongxing Lu, Haojin Zhu, Pin-Han Ho, Xuemin Shen Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Wei Zhao, Dingfeng Ye Modified Huang-Wang's Convertible Nominative Signature Scheme. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Xiaofeng Chen 0004, Dengguo Feng A New Direct Anonymous Attestation Scheme from Bilinear Maps. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Chengyu Fan, Shijie Zhou, Fagen Li Deniable Proxy-Anonymous Signatures. Search on Bibsonomy ICYCS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Jiao Zhang, Yujun Zhang, Ye Tian, Zhongcheng Li CPK-based fast authentication method in Mobile IPv6 networks. Search on Bibsonomy ISCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Mingwu Zhang, Bo Yang 0003, Shenglin Zhu, Wenzheng Zhang Assertions Signcryption Scheme in Decentralized Autonomous Trust Environments. Search on Bibsonomy ATC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF autonomous trust domain, privacy, Trust management, assertion, signcryption
13Yaling Zhang, Jing Zhang, Yikun Zhang Multi-signers Strong Designated Verifier Signature Scheme. Search on Bibsonomy SNPD The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Multi-signers, Designated Verifier Signature
13David Bauer, Douglas M. Blough, David Cash Minimal information disclosure with efficiently verifiable credentials. Search on Bibsonomy Digital Identity Management The full citation details ... 2008 DBLP  DOI  BibTeX  RDF hash-tree, identity assertion, privacy, PKI, identity management, credential, merkle tree
13Varad Kirtane, C. Pandu Rangan RSA-TBOS signcryption with proxy re-encryption. Search on Bibsonomy Digital Rights Management Workshop The full citation details ... 2008 DBLP  DOI  BibTeX  RDF signcryption, proxy re-encryption
13Yanlin Qin, Xiaoping Wu Cryptanalysis and Improvement of Two Blind Proxy Signature Schemes. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13S. Sharmila Deva Selvi, S. Sree Vivek, C. Pandu Rangan, Neha Jain Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme. Search on Bibsonomy EUC (2) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 Server-Aided Verification Signatures: Definitions and New Constructions. Search on Bibsonomy ProvSec The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Server-aided computation, server-aided verification, BLS, ZSS, untrusted server, random oracle
13Emmanuel Bresson, Jean Monnerat, Damien Vergnaud Separation Results on the "One-More" Computational Problems. Search on Bibsonomy CT-RSA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF “One-more” problems, Random self-reducible problems, Algebraic algorithms, Black-box reductions
13Fengying Li, Qingshui Xue, Jiping Zhang 0001, Zhenfu Cao A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme. Search on Bibsonomy CollaborateCom The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Simon Kramer 0001 Logical concepts in cryptography. Search on Bibsonomy SIGACT News The full citation details ... 2007 DBLP  DOI  BibTeX  RDF applied formal logic, information security
13Ling Cheung, Calvin C. Newport Provably secure ciphertext policy ABE. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF access control, public key cryptography, attribute-based encryption
13Chung Ki Li, Guomin Yang, Duncan S. Wong, Xiaotie Deng, Sherman S. M. Chow An Efficient Signcryption Scheme with Key Privacy. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Ciphertext Anonymity, Gap Diffie-Hellman, Signcryption, Key Privacy
13Wei Wu 0001, Yi Mu 0001, Willy Susilo, Xinyi Huang 0001 Provably Secure Identity-Based Undeniable Signatures with Selective and Universal Convertibility. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Provable Security, Undeniable Signatures, Identity-based, Convertible
13Douglas Wikström Designated Confirmer Signatures Revisited. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 163 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license