|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5777 occurrences of 2201 keywords
|
|
|
Results
Found 13353 publication records. Showing 13353 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
48 | Naveena Nagi, Abhijit Chatterjee, Heebyung Yoon, Jacob A. Abraham |
Signature analysis for analog and mixed-signal circuit test response compaction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. ![In: IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 17(6), pp. 540-546, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
|
48 | Qian Wei, Jingsha He, Huiying Shao |
A directed signature scheme and its application to group key initial distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 265-269, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
confidential group communication, directed signature, group key initial distribution |
48 | Sargur N. Srihari, Kamal Kuzhinjedathu, Harish Srinivasan, Chen Huang 0002, Danjun Pu |
Signature Verification Using a Bayesian Approach. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IWCF ![In: Computational Forensics, Second International Workshop, IWCF 2008, Washington, DC, USA, August 7-8, 2008, Proceedings, pp. 192-203, 2008, Springer, 978-3-540-85302-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Signature verification, Bayesian approach |
48 | Kwangsu Lee, Jung Yeon Hwang, Dong Hoon Lee 0001 |
Non-interactive Identity-Based DNF Signature Scheme and Its Extensions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICISC ![In: Information Security and Cryptology - ICISC 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers, pp. 166-183, 2008, Springer, 978-3-642-00729-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Signer Anonymity, Identity-Based Signature, Disjunctive Normal Form, Access Structure |
48 | Jianbin Zheng, Xiaolei Gao, Enqi Zhan, Zhangcan Huang |
Algorithm of On-Line Handwriting Signature Verification Based on Discrete Fréchet Distance. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISICA ![In: Advances in Computation and Intelligence, Third International Symposium, ISICA 2008, Wuhan, China, December 19-21, 2008 Proceedings, pp. 461-469, 2008, Springer, 978-3-540-92136-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
discrete Fréchet distance, decision-making, matching, Signature verification |
48 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Futai Zhang |
Breaking and Repairing Trapdoor-Free Group Signature Schemes from Asiacrypt'2004. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 22(1), pp. 71-74, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cryptography, digital signature, information security |
48 | Sunghun Kim 0001, E. James Whitehead Jr., Jennifer Bevan |
Analysis of signature change patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGSOFT Softw. Eng. Notes ![In: ACM SIGSOFT Softw. Eng. Notes 30(4), pp. 1-5, 2005. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
signature change patterns, software evolution path, software evolution |
48 | Sunghun Kim 0001, E. James Whitehead Jr., Jennifer Bevan |
Analysis of signature change patterns. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MSR ![In: Proceedings of the 2005 International Workshop on Mining Software Repositories, MSR 2005, Saint Louis, Missouri, USA, May 17, 2005, 2005, ACM, 1-59593-123-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
signature change patterns, software evolution path, software evolution |
48 | Chin-Chen Chang 0001, Yeu-Pong Lai |
A convertible group signature scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM SIGOPS Oper. Syst. Rev. ![In: ACM SIGOPS Oper. Syst. Rev. 38(4), pp. 58-65, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
group signature, discrete logarithm problem, convertible, one way hash function |
48 | Laurence Bull, David McG. Squire |
XML Signature Extensibility Using Custom Transforms. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISE ![In: Web Information Systems - WISE 2004, 5th International Conference on Web Information Systems Engineering, Brisbane, Australia, November 22-24, 2004, Proceedings, pp. 102-112, 2004, Springer, 3-540-23894-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
XML Signature Custom Transforms, XML Signatures |
48 | Omaima Bamasak, Ning Zhang 0001 |
A secure method for signature delegation to mobile agents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pp. 813-818, 2004, ACM, 1-58113-812-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
signature delegation, non-repudiation, mobile agent security |
48 | Eu-Jin Goh, Stanislaw Jarecki |
A Signature Scheme as Secure as the Diffie-Hellman Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp. 401-415, 2003, Springer, 3-540-14039-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
Computational Diffie-Hellman, Discrete Logarithm, Random Oracle Model, Signature Schemes, Exact Security, Tight Reductions |
48 | Jae Soo Yoo, Yoon-Joon Lee, Jae-Woo Chang, Myoung-Ho Kim |
The HS File: A New Dynamic Signature File Method for Efficient Information Retrieval. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DEXA ![In: Database and Expert Systems Applications, 5th International Conference, DEXA '94, Athens, Greece, September 7 - 9, 1994, Proceedings, pp. 571-580, 1994, Springer, 3-540-58435-8. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
performance evaluation, information retrieval, dynamic environment, signature file |
48 | Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres, Benjamín Ramos, Arturo Ribagorda |
Extended electronic signature policies. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SIN ![In: Proceedings of the 2nd International Conference on Security of Information and Networks, SIN 2009, Gazimagusa, North Cyprus, October 6-10, 2009, pp. 268-277, 2009, ACM, 978-1-60558-412-6. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
extended business model, signature policy, e-commerce, public key infrastructure, electronic signature, ASN.1 |
48 | Guilin Wang, Feng Bao 0001 |
Security Remarks on a Convertible Nominative Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SEC ![In: New Approaches for Security, Privacy and Trust in Complex Environments, Proceedings of the IFIP TC-11 22nd International Information Security Conference (SEC 2007), 14-16 May 2007, Sandton, South Africa, pp. 265-275, 2007, Springer, 978-0-387-72366-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Nominative signature, digital signature, information security, attacks |
48 | Chin-Chen Chang 0001, Kuo-Lun Chen, Chu-Hsing Lin, Jen-Chieh Chang |
A Group-Oriented (t, n) Threshold Signature Scheme Against Replay Attacks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, Third International Conference, UIC 2006, Wuhan, China, September 3-6, 2006, Proceedings, pp. 816-825, 2006, Springer, 3-540-38091-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Group-oriented signature, (t, n) threshold signature, replay attack, message recovery, data linkage |
48 | Bin-Hong Lin, Shao-Hui Shieh, Cheng-Wen Wu |
A MISR Computation Algorithm for Fast Signature Simulation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asian Test Symposium ![In: 5th Asian Test Symposium (ATS '96), November 20-22, 1996, Hsinchu, Taiwan, pp. 213-218, 1996, IEEE Computer Society, 0-8186-7478-4. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
single-input signature register, memory-oriented policy, time-oriented policy, reverse zero-checking policy, Multiple-input signature register |
48 | István Majzik |
Software Monitoring and Debugging Using Compressed Signature Sequences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROMICRO ![In: 22rd EUROMICRO Conference '96, Beyond 2000: Hardware and Software Design Strategies, September 2-5, 1996, Prague, Czech Republic, pp. 311-318, 1996, IEEE Computer Society, 0-8186-7487-3. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
run-time sequence, compressed signature sequences, signature based error detection techniques, signature buffer, real-time compression methods, predefined dictionaries, program debugging, structural information, software monitoring, software debugging, watchdog processors |
48 | Luan Ling Lee, Toby Berger, Erez Aviczer |
Reliable On-Line Human Signature Verification Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Pattern Anal. Mach. Intell. ![In: IEEE Trans. Pattern Anal. Mach. Intell. 18(6), pp. 643-647, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
human signature verification, point-of-sale, point-of-delivery, Signature verification, forgery, on-line signature verification, dynamic signature verification |
47 | Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Wei Wu 0001 |
Provably Secure Pairing-Based Convertible Undeniable Signature with Short Signature Length. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Pairing ![In: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings, pp. 367-391, 2007, Springer, 978-3-540-73488-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Provable Security, Bilinear Pairings, Undeniable Signatures, Short Signature, Convertible |
47 | Li-Sha He, Ning Zhang 0001 |
A new signature scheme: joint-signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), Nicosia, Cyprus, March 14-17, 2004, pp. 807-812, 2004, ACM, 1-58113-812-1. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
M-Payment, digital signature, security protocol, M-Commerce |
47 | Guoyan Zhang, Shaohui Wang |
A Certificateless Signature and Group Signature Schemes against Malicious PKG. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, GinoWan, Okinawa, Japan, March 25-28, 2008, pp. 334-341, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
malicious PKG, group signature, certificateless signature |
47 | Jin Li 0002, Kwangjo Kim, Fangguo Zhang, Xiaofeng Chen 0001 |
Aggregate Proxy Signature and Verifiably Encrypted Proxy Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, First International Conference, ProvSec 2007, Wollongong, Australia, November 1-2, 2007, Proceedings, pp. 208-217, 2007, Springer, 978-3-540-75669-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Bilinear pairings, Proxy signature, Random oracle, Aggregate signature |
45 | Stanislaw Jarecki, Josh Olsen |
Proactive RSA with Non-interactive Signing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 12th International Conference, FC 2008, Cozumel, Mexico, January 28-31, 2008, Revised Selected Papers, pp. 215-230, 2008, Springer, 978-3-540-85229-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Aggelos Kiayias, Hong-Sheng Zhou |
Equivocal Blind Signatures and Adaptive UC-Security. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008., pp. 340-355, 2008, Springer, 978-3-540-78523-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
45 | Qiong Huang 0001, Duncan S. Wong, Yiming Zhao |
Generic Transformation to Strongly Unforgeable Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings, pp. 1-17, 2007, Springer, 978-3-540-72737-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
45 | Tatsuaki Okamoto |
Efficient Blind and Partially Blind Signatures Without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings, pp. 80-99, 2006, Springer, 3-540-32731-2. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
45 | Shimon Even, Oded Goldreich 0001, Silvio Micali |
On-Line/Off-Line Digital Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 263-275, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
45 | Gustavus J. Simmons |
A Secure Subliminal Channel (?). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '85, Santa Barbara, California, USA, August 18-22, 1985, Proceedings, pp. 33-41, 1985, Springer, 3-540-16463-4. The full citation details ...](Pics/full.jpeg) |
1985 |
DBLP DOI BibTeX RDF |
|
45 | Mohd. Razif Shamsuddin, Azlinah Mohamed |
Baseline Image Classification Approach Using Local Minima Selection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IVIC ![In: Visual Informatics: Bridging Research and Practice, First International Visual Informatics Conference, IVIC 2009, Kuala Lumpur, Malaysia, November 11-13, 2009, Proceedings, pp. 727-737, 2009, Springer, 978-3-642-05035-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Signature Baseline, Online Signature, Baseline Extraction, Baseline |
45 | Seiichiro Hangai, Tomoaki Sano, Takahiro Yoshida |
A Comparison of Three Kinds of DP Matching Schemes in Verifying Segmental Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
COST 2101/2102 Conference ![In: Biometric ID Management and Multimodal Communication, Joint COST 2101 and 2102 International Conference, BioID_MultiComm 2009, Madrid, Spain, September 16-18, 2009. Proceedings, pp. 333-339, 2009, Springer, 978-3-642-04390-1. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
segmental signature, EER, signature verification, DP matching |
45 | Sherman S. M. Chow, Raphael C.-W. Phan |
Proxy Re-signatures in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 260-276, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Proxy re-signature, compartment signature, standard model |
45 | N. R. Sunitha, B. B. Amberker, Prashant Koulgi |
Controlled Delegation in e-cheques Using Proxy Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EDOC ![In: 11th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2007), 15-19 October 2007, Annapolis, Maryland, USA, pp. 414-422, 2007, IEEE Computer Society, 0-7695-2891-0. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Se- curity, Digital Signature, Proxy Signature, DSA |
45 | Dongvu Tonien, Willy Susilo, Reihaneh Safavi-Naini |
Multi-party Concurrent Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 9th International Conference, ISC 2006, Samos Island, Greece, August 30 - September 2, 2006, Proceedings, pp. 131-145, 2006, Springer, 3-540-38341-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
bilinear pairings, ring signature, concurrent signature |
45 | Ryotaro Hayashi 0001, Keisuke Tanaka |
The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings, pp. 216-233, 2005, Springer, 3-540-24454-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
undeniable and confirmer signature, anonymity, encryption, RSA, ring signature |
45 | Kemal Bicakci, Nazife Baykal |
Server Assisted Signatures Revisited. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2004, The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings, pp. 143-156, 2004, Springer, 3-540-20996-4. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
server-assisted signature, pervasive computing, digital signature, one-time signature |
45 | Manoj Franklin |
Fast computation of C-MISR signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Asian Test Symposium ![In: 4th Asian Test Symposium (ATS '95), November 23-24, 1995. Bangalore, India, pp. 293-297, 1995, IEEE Computer Society, 0-8186-7129-7. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
C-MISR signatures, built-in self-test applications, good circuit signature, faulty circuit signatures, cellular automata-based multi-input signature registers, equivalent single input circuit, VLSI, logic testing, built-in self test, cellular automata, integrated circuit testing, sequential circuits, shift registers, test responses, signature analyzers, equivalent circuits |
44 | Qingshui Xue, Fengying Li, Yuan Zhou 0008, Jiping Zhang 0001, Zhenfu Cao, Haifeng Qian |
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MobiSec ![In: Security and Privacy in Mobile Information and Communication Systems, First International ICST Conference, MobiSec 2009, Turin, Italy, June 3-5, 2009, Revised Selected Papers, pp. 58-70, 2009, Springer, 978-3-642-04433-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
44 | Sargur N. Srihari, Harish Srinivasan, Siyuan Chen, Matthew J. Beal |
Machine Learning for Signature Verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Machine Learning in Document Analysis and Recognition ![In: Machine Learning in Document Analysis and Recognition, pp. 387-408, 2008, Springer, 978-3-540-76279-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Jianhong Zhang, Jianjun Xie |
Security Analysis and their Improvement of Two Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICYCS ![In: Proceedings of the 9th International Conference for Young Computer Scientists, ICYCS 2008, Zhang Jia Jie, Hunan, China, November 18-21, 2008, pp. 1412-1417, 2008, IEEE Computer Society, 978-0-7695-3398-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Atsushi Koide, Raylin Tso, Eiji Okamoto |
Convertible Undeniable Partially Blind Signature from Bilinear Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC (2) ![In: 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 17-20, 2008, Volume II: Workshops, pp. 77-82, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
44 | Wenyuan Liu, Feng Tong, Yongan Luo, Feng Zhang |
A proxy blind signature scheme based on elliptic curve with proxy revocation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SNPD (1) ![In: Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2007, July 30 - August 1, 2007, Qingdao, China, pp. 99-104, 2007, IEEE Computer Society, 0-7695-2909-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Masahiko Takenaka, Takashi Yoshioka |
A Sanitizable Signature Scheme with Aggregation. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Third International Conference, ISPEC 2007, Hong Kong, China, May 7-9, 2007, Proceedings, pp. 51-64, 2007, Springer, 978-3-540-72159-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Jianhong Zhang |
An Efficient Identity-Based Ring Signature Scheme and Its Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (2) ![In: Computational Science and Its Applications - ICCSA 2007, International Conference, Kuala Lumpur, Malaysia, August 26-29, 2007. Proceedings, Part II, pp. 63-74, 2007, Springer, 978-3-540-74475-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
44 | Chunbo Ma, Jianhua Li 0001 |
Adaptable Designated Group Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIC (1) ![In: Intelligent Computing, International Conference on Intelligent Computing, ICIC 2006, Kunming, China, August 16-19, 2006. Proceedings, Part I, pp. 1053-1061, 2006, Springer, 3-540-37271-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Sheng Guo, Zhenfu Cao, Rongxing Lu |
An Efficient ID-Based Multi-proxy Multi-Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IMSCCS (2) ![In: Interdisciplinary and Multidisciplinary Research in Computer Science, IEEE CS Proceeding of the First International Multi-Symposium of Computer and Computational Sciences (IMSCCS|06), June 20-24, 2006, Zhejiang University, Hangzhou, China, Vol. 2, pp. 81-88, 2006, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Jianhong Zhang, Jian Mao |
Linkability Analysis of Some Blind Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIS ![In: Computational Intelligence and Security, International Conference, CIS 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers, pp. 556-566, 2006, Springer, 978-3-540-74376-7. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
44 | Yevgeniy Dodis, Dae Hyun Yum |
Time Capsule Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 57-71, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Yeu-Pong Lai, Chin-Chen Chang 0001 |
A Simple Forward Secure Blind Signature Scheme Based on Master Keys and Blind Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 19th International Conference on Advanced Information Networking and Applications (AINA 2005), 28-30 March 2005, Taipei, Taiwan, pp. 139-144, 2005, IEEE Computer Society, 0-7695-2249-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
44 | Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo |
An Efficient Signature Scheme from Bilinear Pairings and Its Applications. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004, pp. 277-290, 2004, Springer, 3-540-21018-0. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
44 | Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung |
Strong Key-Insulated Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings, pp. 130-144, 2003, Springer, 3-540-00324-X. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
44 | Dawn Xiaodong Song |
Practical forward secure group signature schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001., pp. 225-234, 2001, ACM, 1-58113-385-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
44 | Khanh Quoc Nguyen, Yi Mu 0001, Vijay Varadharajan |
Undeniable Confirmer Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISW ![In: Information Security, Second International Workshop, ISW'99, Kuala Lumpur, Malaysia, November 1999, Proceedings, pp. 235-246, 1999, Springer, 3-540-66695-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
|
44 | Christos Faloutsos, Stavros Christodoulakis |
Optimal Signature Extraction and Information Loss. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Database Syst. ![In: ACM Trans. Database Syst. 12(3), pp. 395-428, 1987. The full citation details ...](Pics/full.jpeg) |
1987 |
DBLP DOI BibTeX RDF |
|
44 | Fuchun Guo, Yi Mu 0001, Willy Susilo |
How to Prove Security of a Signature with a Tighter Security Reduction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings, pp. 90-103, 2009, Springer, 978-3-642-04641-4. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Signature, Security Proof, Chameleon Hash |
44 | Koutarou Suzuki, Fumitaka Hoshino, Tetsutaro Kobayashi |
Relinkable Ring Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 518-536, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
anonymity, pairing, ring signature |
44 | Xinyi Huang 0001, Willy Susilo, Yi Mu 0001, Wei Wu 0001 |
Secure universal designated verifier signature without random oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 7(3), pp. 171-183, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Universal designated verifier signature, Gap Bilinear Diffie Hellman problem, Security analysis, Random oracle |
44 | Shaohui Wang |
Modification and Improvement on Group Signature Scheme without Random Oracles. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISECS ![In: Proceedings of The International Symposium on Electronic Commerce and Security, ISECS 2008, August 3-5, 2008, Guangzhou, China, pp. 462-466, 2008, IEEE Computer Society, 978-0-7695-3258-5. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Anonymity, Group Signature, Random Oracle Model, Bilinear |
44 | Carlos Aguilar Melchor, Pierre-Louis Cayrel, Philippe Gaborit |
A New Efficient Threshold Ring Signature Scheme Based on Coding Theory. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PQCrypto ![In: Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings, pp. 1-16, 2008, Springer, 978-3-540-88402-6. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Threshold ring signature, Stern’s Scheme, syndrome decoding, code-based cryptography |
44 | I. Elizabeth Shanthi, Y. Izaaz, R. Nadarajan |
On the SD-tree construction for optimal signature operations. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Bangalore Compute Conf. ![In: Proceedings of the 1st Bangalore Annual Compute Conference, Compute 2008, Bangalore, India, January 18-20, 2008, pp. 14, 2008, ACM, 978-1-59593-950-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
OODB, information retrieval, indexing, signature file |
44 | Javier Ruiz-del-Solar, Christ Devia, Patricio Loncomilla, Felipe Concha |
Offline Signature Verification Using Local Interest Points and Descriptors. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CIARP ![In: Progress in Pattern Recognition, Image Analysis and Applications, 13th Iberoamerican Congress on Pattern Recognition, CIARP 2008, Havana, Cuba, September 9-12, 2008. Proceedings, pp. 22-29, 2008, Springer, 978-3-540-85919-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Matching techniques, Signature Verification, SIFT descriptors |
44 | Zhenhua Liu 0001, Yupu Hu, Hua Ma |
Secure Proxy Multi-signature Scheme in the Standard Model. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ProvSec ![In: Provable Security, Second International Conference, ProvSec 2008, Shanghai, China, October 30 - November 1, 2008. Proceedings, pp. 127-140, 2008, Springer, 978-3-540-88732-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
proxy multi-signature, provable security, bilinear pairings, standard model |
44 | Ingrid Biehl, Sachar Paulus, Tsuyoshi Takagi |
Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 31(2), pp. 99-123, 2004. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
quadratic field idea arithmetic, undeniable signature, efficient computation |
44 | Chin-Chen Chang 0001, Kuo-Feng Hwang |
Towards the Forgery of a Group Signature without Knowing the Group Center's Secret. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, Third International Conference, ICICS 2001, Xian, China, November 13-16, 2001, pp. 47-51, 2001, Springer, 3-540-42880-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
convertible group signature, Cryptography, cryptanalysis |
44 | Jinn-ke Jan, Yuh-Min Tseng |
New Digital Signature with Subliminal Channels Based on the Discrete Logarithm Problem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: Proceedings of the 1999 International Conference on Parallel Processing Workshops, ICPPW 1999, Wakamatsu, Japan, September 21-24, 1999, pp. 198-203, 1999, IEEE Computer Society, 0-7695-0353-5. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Cryptography, Digital signature, Discrete logarithm, Subliminal channel |
44 | Dik Lun Lee, Liming Ren |
Document Ranking on Weight-Partitioned Signature Files. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACM Trans. Inf. Syst. ![In: ACM Trans. Inf. Syst. 14(2), pp. 109-137, 1996. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
information retrieval, access method, document retrieval, text retrieval, signature file, superimposed coding |
44 | Duo Liu, Ping Luo, Yiqi Dai |
Attack on Digital Multi-Signature Scheme Based on Elliptic Curve Cryptosystem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Comput. Sci. Technol. ![In: J. Comput. Sci. Technol. 22(1), pp. 92-94, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
cryptography, digital signature, elliptic curve, multi-signature |
44 | Xinyi Huang 0001, Yi Mu 0001, Willy Susilo, Futai Zhang |
Short Designated Verifier Proxy Signature from Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUC Workshops ![In: Embedded and Ubiquitous Computing - EUC 2005 Workshops, EUC 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings, pp. 835-844, 2005, Springer, 3-540-30803-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Authentication, Pairings, Proxy Signature, Short Signature |
44 | Li-Shan Liu, Cheng-Kang Chu, Wen-Guey Tzeng |
A Threshold GQ Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, First International Conference, ACNS 2003. Kunming, China, October 16-19, 2003, Proceedings, pp. 137-150, 2003, Springer, 3-540-20208-0. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
threshold signature scheme, GQ signature scheme |
44 | Toru Nakanishi 0001, Masayuki Tao, Yuji Sugiyama |
A Group Signature Scheme Committing the Group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 4th International Conference, ICICS 2002, Singapore, December 9-12, 2002, Proceedings, pp. 73-84, 2002, Springer, 3-540-00164-6. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Signature of knowledge, Strong RSA assumption, Group signature scheme |
44 | Jan Camenisch, Markus Michels |
A Group Signature Scheme with Improved Efficiency. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings, pp. 160-174, 1998, Springer, 3-540-65109-8. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Group signature scheme for large groups, revocable anonymity, digital signature schemes |
44 | Brigitte Wirtz |
Average prototypes for stroke-based signature verification. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: 4th International Conference Document Analysis and Recognition (ICDAR '97), 2-Volume Set, August 18-20, 1997, Ulm, Germany, Proceedings, pp. 268-272, 1997, IEEE Computer Society, 0-8186-7898-4. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
stroke-based signature verification, average prototypes, enrolment subsystem, verification subsystem, reference construction, verification rates, position-based averaging, time-based averaging, representative input signatures, varying stroke structures, missing strokes, additional strokes, natural stroke structure, input signatures, handwriting recognition, error rate, dynamic signature verification |
44 | Dariusz Z. Lejtman, Susan E. George |
On-line Handwritten Signature Verification Using Wavelets and Back-propagation Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICDAR ![In: 6th International Conference on Document Analysis and Recognition (ICDAR 2001), 10-13 September 2001, Seattle, WA, USA, pp. 992-996, 2001, IEEE Computer Society, 0-7695-1263-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Handwritten signature verification, Neural networks, Pattern recognition, Wavelet transform, On-line signature verification, Dynamic signature verification |
43 | Shafi Goldwasser, Erez Waisbard |
Transformation of Digital Signature Schemes into Designated Confirmer Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings, pp. 77-100, 2004, Springer, 3-540-21000-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
40 | Fangguo Zhang, Willy Susilo, Yi Mu 0001 |
Identity-Based Partial Message Recovery Signatures (or How to Shorten ID-Based Signatures). ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 9th International Conference, FC 2005, Roseau, The Commonwealth of Dominica, February 28 - March 3, 2005, Revised Papers, pp. 45-56, 2005, Springer, 3-540-26656-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Xiangguo Cheng, Jingmei Liu, Xinmei Wang |
Identity-Based Aggregate and Verifiably Encrypted Signatures from Bilinear Pairing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICCSA (4) ![In: Computational Science and Its Applications - ICCSA 2005, International Conference, Singapore, May 9-12, 2005, Proceedings, Part IV, pp. 1046-1054, 2005, Springer, 3-540-25863-9. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Marek Klonowski, Miroslaw Kutylowski, Anna Lauks, Filip Zagórski |
Conditional Digital Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TrustBus ![In: Trust, Privacy and Security in Digital Business: Second International Conference, TrustBus 2005, Copenhagen, Denmark, August 22-26, 2005, Proceedings, pp. 206-215, 2005, Springer, 3-540-28224-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
40 | Dan Boneh, Craig Gentry, Ben Lynn, Hovav Shacham |
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp. 416-432, 2003, Springer, 3-540-14039-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
40 | Markus Jakobsson, Moti Yung |
Distributed "Magic Ink" Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '97, International Conference on the Theory and Application of Cryptographic Techniques, Konstanz, Germany, May 11-15, 1997, Proceeding, pp. 450-464, 1997, Springer, 3-540-62975-0. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
|
40 | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin |
Robust Threshold DSS Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '96, International Conference on the Theory and Application of Cryptographic Techniques, Saragossa, Spain, May 12-16, 1996, Proceeding, pp. 354-371, 1996, Springer, 3-540-61186-X. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
40 | Rosario Gennaro, Stanislaw Jarecki, Hugo Krawczyk, Tal Rabin |
Robust and Efficient Sharing of RSA Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 157-172, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
|
40 | Markus Stadler, Jean-Marc Piveteau, Jan Camenisch |
Fair Blind Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '95, International Conference on the Theory and Application of Cryptographic Techniques, Saint-Malo, France, May 21-25, 1995, Proceeding, pp. 209-219, 1995, Springer, 3-540-59409-4. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
fair cryptosystems, cryptographic protocols, Blind signatures, electronic payment systems |
40 | David Chaum, Hans Van Antwerpen |
Undeniable Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 212-216, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
40 | Chong-zhi Gao, Baodian Wei, Dongqing Xie, Chunming Tang 0003 |
Divisible On-Line/Off-Line Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CT-RSA ![In: Topics in Cryptology - CT-RSA 2009, The Cryptographers' Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings, pp. 148-163, 2009, Springer, 978-3-642-00861-0. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Divisible On-line/Off-line Signatures, On-line/Off-line Threshold Signatures, Signature Schemes |
40 | Pei-Yih Ting, Fang-Dar Chu |
Enhancing the Security Promise of a Digital Time-Stamp. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AINA ![In: 22nd International Conference on Advanced Information Networking and Applications, AINA 2008, GinoWan, Okinawa, Japan, March 25-28, 2008, pp. 342-347, 2008, IEEE Computer Society. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
hierarchical distributed time source, forward-secure digital signature, PKI, time-stamps |
40 | Nick A. Moldovyan |
New Public Key Cryptosystems Based on Difficulty of Factorization and Discrete Logarithm Problems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IF&GIS ![In: Third International Workshop on Information Fusion and Geographical Information Systems - IF&GIS'07, St. Petersburg, Russia, May 27-29, 2007. Proceedings, pp. 160-172, 2007, Springer, 978-3-540-37628-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
public encryption, Digital signature, public key cryptosystem, key agreement protocol |
40 | Jean-Bernard Fischer, Emmanuel Prouff |
Off-Line Group Signatures with Smart Cards. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CARDIS ![In: Smart Card Research and Advanced Applications, 7th IFIP WG 8.8/11.2 International Conference, CARDIS 2006, Tarragona, Spain, April 19-21, 2006, Proceedings, pp. 263-277, 2006, Springer, 3-540-33311-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
smart card, risk management, Group signature, revocation, dynamic group |
40 | Hui-Feng Huang, Chin-Chen Chang 0001 |
An Untraceable Electronic Cash System Using Fair Blind Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICEBE ![In: 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 24-26 October 2006, Shanghai, China, pp. 39-46, 2006, IEEE Computer Society, 0-7695-2645-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
fair blind signature, privacy, electronic cash, cryptology |
40 | Chris Crutchfield, David Molnar, David Turner, David A. Wagner 0001 |
Generic On-Line/Off-Line Threshold Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings, pp. 58-74, 2006, Springer, 3-540-33851-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
On-line/Off-line, Chameleon Hash Functions, Threshold Cryptography, Signature Schemes, Bursty Traffic |
40 | Lan Zhou, Willy Susilo, Yi Mu 0001 |
Three-Round Secret Handshakes Based on ElGamal and DSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, pp. 332-342, 2006, Springer, 3-540-33052-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Oblivious Signature Based Envelope, Hidden Credential, Privacy, Key Exchange, DSA, ElGamal, Secret Handshake |
40 | Anita Jones, Song Li |
Temporal Signatures for Intrusion Detection. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACSAC ![In: 17th Annual Computer Security Applications Conference (ACSAC 2001), 11-14 December 2001, New Orleans, Louisiana, USA, pp. 252-261, 2001, IEEE Computer Society, 0-7695-1405-7. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
application intrusion detection, temporal signature, security |
40 | Chin-Chen Chang 0001, Jyh-Jong Leu, Pai-Cheng Huang, Wei-Bin Lee |
A Scheme for Obtaining a Message from the Digital Multisignature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, PKC '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings, pp. 154-163, 1998, Springer, 3-540-64693-0. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
digital signature, multisignature, message recovery |
40 | Erik Dahmen, Christoph Krauß |
Short Hash-Based Signatures for Wireless Sensor Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CANS ![In: Cryptology and Network Security, 8th International Conference, CANS 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings, pp. 463-476, 2009, Springer, 978-3-642-10432-9. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
hash-based signature scheme, Winternitz one-time signature scheme, wireless sensor network, hash chain |
39 | Tarig A. Osman, Mohan Krishnan 0001, Mark J. Paulik |
A minimum-velocity-based segmentation scheme for improved performance of an online signature verification system. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EIT ![In: 2008 IEEE International Conference on Electro/Information Technology, EIT 2008, held at Iowa State University, Ames, Iowa, USA, May 18-20, 2008, pp. 78-83, 2008, IEEE, 978-1-4244-2030-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
39 | Jean Hennebert, Renato Loeffel, Andreas Humm, Rolf Ingold |
A New Forgery Scenario Based on Regaining Dynamics of Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICB ![In: Advances in Biometrics, International Conference, ICB 2007, Seoul, Korea, August 27-29, 2007, Proceedings, pp. 366-375, 2007, Springer, 978-3-540-74548-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Jianhong Zhang |
An Improved Designated-Verifier Proxy Signature Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE NAS ![In: International Conference on Networking, Architecture, and Storage, NAS 2007, 29-31 July 2007, Guilin, China, pp. 77-82, 2007, IEEE Computer Society, 0-7695-2927-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Eiichiro Fujisaki, Koutarou Suzuki |
Traceable Ring Signature. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Public Key Cryptography ![In: Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings, pp. 181-200, 2007, Springer, 978-3-540-71676-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Xuanwu Zhou, Xiaoyuan Yang 0002, Ping Wei 0005, Yupu Hu |
Dynamic Group Signature with Forward Security and Its Application. ![Search on Bibsonomy](Pics/bibsonomy.png) |
GCC ![In: Grid and Cooperative Computing, Sixth International Conference on Grid and Cooperative Computing, GCC 2007, August 16-18, 2007, Urumchi, Xinjiang, China, Proceedings, pp. 473-480, 2007, IEEE Computer Society, 0-7695-2871-6. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Ching-Te Wang, Chiu-Hsiung Liao, Tung-Shou Chen |
Audio-Signal Authenticating System Based on Asymmetric Signature Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea, pp. 656-661, 2007, IEEE Computer Society, 978-0-7695-2777-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
39 | Jianhong Zhang |
A verifiably encrypted signature scheme with strong unforgeability. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Infoscale ![In: Proceedings of the 2nf International Conference on Scalable Information Systems, Infoscale 2007, Suzhou, China, June 6-8, 2007, pp. 66, 2007, ACM, 978-1-59593-757-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
security analysis, proof, verifiably encryption |
Displaying result #101 - #200 of 13353 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ >>] |
|