|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 5777 occurrences of 2201 keywords
|
|
|
Results
Found 13353 publication records. Showing 13353 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
27 | John M. Boyer |
Bulletproof business process automation: securing XML forms with document subset signatures. |
XML Security |
2003 |
DBLP DOI BibTeX RDF |
XFDL, XML signature transforms, secure XML forms, XForms |
27 | Henri Gilbert, Marine Minier |
Cryptanalysis of SFLASH. |
EUROCRYPT |
2002 |
DBLP DOI BibTeX RDF |
asymmetric signature, cryptanalysis, multivariate polynomials, SFLASH |
27 | Chin-Chen Chang 0001, Ju Yuan Hsiao, Chi-Lung Chiang |
An Image Copyright Protection Scheme Based on Torus Automorphism. |
CW |
2002 |
DBLP DOI BibTeX RDF |
torus automorphism, Watermark, digital signature |
27 | Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier |
Universal Padding Schemes for RSA. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
Probabilistic Signature Scheme, Provable Security |
27 | Hyo-Chang Nam, Jong Kim 0001, Sung Je Hong, Sunggu Lee |
Reliable Probabilistic Checkpointing. |
PRDC |
1999 |
DBLP DOI BibTeX RDF |
Signature generation function, Performance analysis, Checkpointing, Aliasing, Failure recovery |
27 | Lawrence O'Gorman, Irina Rabinovich |
Secure Identification Documents Via Pattern Recognition and Public-Key Cryptography. |
IEEE Trans. Pattern Anal. Mach. Intell. |
1998 |
DBLP DOI BibTeX RDF |
Document authentication, document image recognition, photo signature, photo-ID documents, ID cards, pattern recognition, cryptography, counterfeiting |
27 | Peter A. Moldovyanu, E. Dernova, A. Kostina, Nick A. Moldovyan |
Multisignature Protocols and Problem of Simultaneous Signing a Package of Contracts. |
IF&GIS |
2009 |
DBLP DOI BibTeX RDF |
Collective digital signature, multisignature schemes, Digital signature, Public key, Finite group, Discrete logarithm problem |
27 | D. S. Guru, H. N. Prakash, T. N. Vikram |
Spatial Topology of Equitemporal Points on Signatures for Retrieval. |
PReMI |
2007 |
DBLP DOI BibTeX RDF |
Signature retrieval, Online Signature, Spatial similarity |
27 | Xiangxue Li, Dong Zheng 0001, Kefei Chen |
Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register. |
ICA3PP |
2007 |
DBLP DOI BibTeX RDF |
characteristic sequence, linkable ring signature, linear feedback shift-register, threshold signature |
27 | Huafei Zhu, Feng Bao 0001, Robert H. Deng |
Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. |
ICICS |
2005 |
DBLP DOI BibTeX RDF |
Homomorphic trapdoor one-way permutation, sequential aggregate signature, signature scheme |
27 | István Zsolt Berta, Levente Buttyán, István Vajda |
Mitigating the Untrusted Terminal Problem Using Conditional Signatures. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
untrusted terminal, conditional signature, smart card, message authentication, electronic signature |
27 | Ming-Der Shieh, Hsin-Fu Lo, Ming-Hwa Sheu |
High-speed generation of LFSR signatures. |
Asian Test Symposium |
2000 |
DBLP DOI BibTeX RDF |
high-speed generation, LFSR signatures, compaction simulation, single-input signature register, equivalent multiple-input implementation, finite field theory, high-speed signature computations, lookahead technique, internal-XOR LFSR, external-XOR LFSR, performance evaluation, logic testing, built-in self test, integrated circuit testing, automatic test pattern generation, BIST, linear feedback shift register, binary sequences, subsequences |
27 | Nirmal R. Saxena, Edward J. McCluskey |
Parallel Signatur Analysis Design with Bounds on Aliasing. |
IEEE Trans. Computers |
1997 |
DBLP DOI BibTeX RDF |
aliasing probability bounds, parallel signature designs, multiple input signature registers (MISR), linear feedback shift registers, random testing, Signature analysis |
27 | Shambhu J. Upadhyaya, Bina Ramamurthy |
Concurrent Process Monitoring with No Reference Signatures. |
IEEE Trans. Computers |
1994 |
DBLP DOI BibTeX RDF |
concurrent process monitoring, signature technique, compilation phase, signature checking, controllable latency, branch-free interval, error coverage, sequencing errors, fault tolerant computing, controllability, program testing, signature analysis, control flow graph, error checking, bit errors, watchdog processor, error latency |
26 | Smita Krishnaswamy, Stephen Plaza, Igor L. Markov, John P. Hayes |
Signature-Based SER Analysis and Design of Logic Circuits. |
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Jingran Wang, Haifeng Qian |
An Optimal Blind Signature Padding with Message Recovery. |
IAS |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu |
Towards Efficient ID-Based Signature Schemes with Batch Verifications from Bilinear Pairings. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka |
Yet Another Sanitizable Signature from Bilinear Maps. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Kar Way Tan, Robert H. Deng |
Applying Sanitizable Signature to Web-Service-Enabled Business Processes: Going Beyond Integrity Protection. |
ICWS |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Jonathan Katz, Vinod Vaikuntanathan |
Signature Schemes with Bounded Leakage Resilience. |
ASIACRYPT |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Danjun Pu, Gregory R. Ball, Sargur N. Srihari |
A Machine Learning Approach to Off-Line Signature Verification Using Bayesian Inference. |
IWCF |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Jianhong Zhang, Hua Chen, Qin Geng |
Efficient and Provably Secure Self-certified Signature Scheme. |
AMT |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Enrique Argones-Rúa, David Pérez-Piñar López, José Luis Alba-Castro |
Ergodic HMM-UBM System for On-Line Signature Verification. |
COST 2101/2102 Conference |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Giuseppe Pirlo, Donato Impedovo, Erasmo Stasolla, Claudia Adamita Trullo |
Learning Local Correspondences for Static Signature Verification. |
AI*IA |
2009 |
DBLP DOI BibTeX RDF |
|
26 | Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum |
New Multiparty Signature Schemes for Network Routing Applications. |
ACM Trans. Inf. Syst. Secur. |
2008 |
DBLP DOI BibTeX RDF |
network security, digital signatures, pairings, identity-based signatures, multisignatures, aggregate signatures |
26 | Ismail A. Ismail, Mohammed A. Ramadan, Talaat El Danf, Ahmed H. Samak |
Automatic Signature Recognition and Verification Using Principal Components Analysis. |
CGIV |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Xiaodong Lin 0001, Rongxing Lu, Haojin Zhu, Pin-Han Ho, Xuemin Shen |
Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings. |
ICC |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Marcos Martinez-Diaz, Julian Fiérrez-Aguilar, Javier Galbally, Javier Ortega-Garcia |
Towards mobile authentication using dynamic signature verification: Useful features and performance evaluation. |
ICPR |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Fengtao Xiao, Huaping Hu, Xin Chen, Bo Liu 0014 |
ASG Automated Signature Generation for Worm-Like P2P Traffic Patterns. |
WAIM |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Thomas Plantard, Willy Susilo, Khin Than Win |
A Digital Signature Scheme Based on CVPinfinity. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Pierre-Alain Fouque, Gilles Macario-Rat, Ludovic Perret, Jacques Stern |
Total Break of the l-IC Signature Scheme. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Zoe Lin Jiang, Siu-Ming Yiu, Lucas Chi Kwong Hui, Y. Dong, Starsky H. Y. Wong |
Chained Threshold Proxy Signature without and with Supervision. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Xuanwu Zhou, Ping Wei 0005 |
Anonymous Proxy Authorization Signature Scheme with Forward Security. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Yanlin Qin, Xiaoping Wu |
Cryptanalysis and Improvement of Two Blind Proxy Signature Schemes. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Youan Xiao, Zude Zhou |
A New Kind of Self-Certified Proxy Digital Signature Scheme. |
CSSE (3) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Hao Tu, Zhitang Li, Bin Liu 0013 |
Mining Network Traffic for Worm Signature Extraction. |
FSKD (4) |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Emanuele Maiorana, Patrizio Campisi, Alessandro Neri 0001 |
Template Protection for On-Line Signature-Based Recognition Systems. |
BIOID |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Susanta Nanda, Tzi-cker Chiueh |
Execution Trace-Driven Automated Attack Signature Generation. |
ACSAC |
2008 |
DBLP DOI BibTeX RDF |
|
26 | Kok Wai Wong, Tamás D. Gedeon, László T. Kóczy |
Fuzzy Signature and Cognitive Modelling for Complex Decision Model. |
IFSA (2) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Ping Han, Yanqin Zhu, Yuemei Hu |
Design of Multi-signature Scheme in Wireless Networks. |
ACIS-ICIS |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee 0001 |
Efficient Certificateless Signature Schemes. |
ACNS |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Mehdi Salour, Xiao Su |
Dynamic Two-Layer Signature-Based IDS with Unequal Databases. |
ITNG |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Wei Wu 0001, Yi Mu 0001, Willy Susilo, Jennifer Seberry, Xinyi Huang 0001 |
Identity-Based Proxy Signature from Pairings. |
ATC |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Chengyu Hu, Daxing Li |
A New Type of Proxy Ring Signature Scheme with Revocable Anonymity. |
SNPD (1) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Yong Li 0002, Huiyan Chen |
Efficient Identity-based Signature Scheme with Partial Message Recovery. |
SNPD (1) |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Rupeng Li, Xianghua Du, Guowen Li, Jia Yu 0005, Daxing Li |
Key-Insulated Group Signature Scheme with Selective Revocation. |
MUE |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Vu Nguyen 0002, Michael Blumenstein, Vallipuram Muthukkumarasamy, Graham Leedham |
Off-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines. |
ICDAR |
2007 |
DBLP DOI BibTeX RDF |
|
26 | Haiyong Bao, Zhenfu Cao, Shengbao Wang |
Identity-Based Threshold Proxy Signature Scheme with Known Signers. |
TAMC |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Siyuan Chen, Sargur N. Srihari |
A New Off-line Signature Verification Method based on Graph. |
ICPR (2) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Stephane Armand, Michael Blumenstein, Vallipuram Muthukkumarasamy |
Off-line Signature Verification based on the Modified Direction Feature. |
ICPR (4) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Chik How Tan |
Public-Key Encryption from ID-Based Encryption Without One-Time Signature. |
OTM Workshops (1) |
2006 |
DBLP DOI BibTeX RDF |
Cryptography, public key encryption, bilinear maps |
26 | Jiguo Li 0001, Yichen Zhang 0003, Zhijian Wang |
Improvement of Threshold Signature Scheme Using Self-Certified Public Key. |
ICICIC (1) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Alain Wahl, Jean Hennebert, Andreas Humm, Rolf Ingold |
Generation and Evaluation of Brute-Force Signature Forgeries. |
MRCS |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Yuan Zhou, Zhenfu Cao, Zhenchuan Chai |
Identity Based Key Insulated Signature. |
ISPEC |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Jianhong Zhang, Tao Wei, Jianyu Zhang, Wei Zou |
Linkability of a Blind Signature Scheme and Its Improved Scheme. |
ICCSA (4) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su |
Designated Verifier Proxy Signature Scheme from Bilinear Pairings. |
IMSCCS (2) |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Zheng Gong, Xiangxue Li, Kefei Chen |
Efficient Partially Blind Signature Scheme with Provable Security. |
COCOON |
2006 |
DBLP DOI BibTeX RDF |
|
26 | Frederik Vanhaverbeke, Marc Moeneclaey |
Optimal signature sets for oversaturated quasi-scalable direct-sequence spread-spectrum systems. |
IEEE Trans. Inf. Theory |
2005 |
DBLP DOI BibTeX RDF |
|
26 | George N. Karystinos, Dimitrios A. Pados |
The maximum squared correlation, sum capacity, and total asymptotic efficiency of minimum total-squared-correlation binary signature sets. |
IEEE Trans. Inf. Theory |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Qibin Sun, Shih-Fu Chang |
A secure and robust digital signature scheme for JPEG2000 image authentication. |
IEEE Trans. Multim. |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong |
ID-Based Signature Scheme Without Trusted PKG. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
|
26 | M. Wirotius, Jean-Yves Ramel, Nicole Vincent |
Distance and Matching for Authentication by On-Line Signature. |
AutoID |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Qin Wang, Zhenfu Cao, Shengbao Wang |
Formalized Security Model of Multi-Proxy Signature Schemes. |
CIT |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Jin Kim, Hyuk Cho, Eui Cha |
A Study on Enhanced Dynamic Signature Verification for the Embedded System. |
BVAI |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Bon K. Sy |
Signature-Based Approach for Intrusion Detection. |
MLDM |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Cemil Öz |
Signature Recognition and Verification with Artificial Neural Network Using Moment Invariant Method. |
ISNN (2) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Canan Senol, Tülay Yildirim |
Signature Verification Using Conic Section Function Neural Network. |
ISCIS |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Xinge You, Bin Fang 0001, Zhenyu He 0001, Yuan Yan Tang |
Similarity Measurement for Off-Line Signature Verification. |
ICIC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Hong-Wei Ji, Zhong-Hua Quan |
Signature Verification Using Wavelet Transform and Support Vector Machine. |
ICIC (1) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Farid Ahmed, Ira S. Moskowitz |
Composite signature based watermarking for fingerprint authentication. |
MM&Sec |
2005 |
DBLP DOI BibTeX RDF |
Phasemark™, composite filter, phase only filter, watermarking, fingerprint, biometric authentication |
26 | Ching Yu Ng, Willy Susilo, Yi Mu 0001 |
Universal Designated Multi Verifier Signature Schemes. |
ICPADS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Chunxiang Gu, Yuefei Zhu |
Provable Security of ID-Based Proxy Signature Schemes. |
ICCNMC |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Duc-Liem Vo, Kwangjo Kim |
Yet Another Forward Secure Signature from Bilinear Pairings. |
ICISC |
2005 |
DBLP DOI BibTeX RDF |
key evolution, pairings, Forward security, key exposure |
26 | Sung-Hyun Yun, Hyung-Woo Lee |
The Large Scale Electronic Voting Scheme Based on Undeniable Multi-signature Scheme. |
ICCSA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Ray R. Hashemi, Joshua H. Early, Mahmood Bahar, Alexander A. Tyler, John F. Young |
A Signature-Based Liver Cancer Predictive System. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
Liver Cancer, Carcinogenic Potency Database, Self-organizing Map (SOM) and Hopfield Net, Predictive Systems |
26 | Shaohua Tang |
Simple Threshold RSA Signature Scheme Based on Simple Secret Sharing. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Richard M. Guest, Michael C. Fairhurst, Claus Vielhauer |
Towards a Flexible Framework for Open Source Software for Handwritten Signature Analysis. |
GfKl |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Liang Wan, Bin Wan |
On-Line Signature Verification With Two-Stage Statistical Models. |
ICDAR |
2005 |
DBLP DOI BibTeX RDF |
|
26 | Vanesa Daza, Javier Herranz, Germán Sáez |
Protocols useful on the Internet from distributed signature schemes. |
Int. J. Inf. Sec. |
2004 |
DBLP DOI BibTeX RDF |
Distributed signatures, Metering schemes, Distributed key distribution schemes |
26 | Xian-Sheng Hua 0001, Xian Chen, HongJiang Zhang |
Robust video signature based on ordinal measure. |
ICIP |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Javier Herranz, Germán Sáez |
Ring Signature Schemes for General Ad-Hoc Access Structures. |
ESAS |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Ran Canetti, Oded Goldreich 0001, Shai Halevi |
On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Ran Canetti |
Universally Composable Signature, Certification, and Authentication. |
CSFW |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Qingshui Xue, Zhenfu Cao |
Improvement of Multi-Proxy Signature Scheme. |
CIT |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Michael Backes 0001, Dennis Hofheinz |
How to Break and Repair a Universally Composable Signature Functionality. |
ISC |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Jing Xu 0002, Zhenfeng Zhang, Dengguo Feng |
A Ring Signature Scheme Using Bilinear Pairings. |
WISA |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Robert Kofler, Robert Krimmer, Alexander Prosser, Martin Karl Unger |
The Role of Digital Signature Cards in Electronic Voting. |
HICSS |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi |
An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. |
SASN |
2004 |
DBLP DOI BibTeX RDF |
proactive cryptosystems, peer-to-peer, mobile ad-hoc networks, admission control, RSA, group membership, threshold cryptosystems |
26 | Yung-Yuan Chen, Kun-Feng Chen |
Incorporating Signature-Monitoring Technique in VLIW Processors. |
DFT |
2004 |
DBLP DOI BibTeX RDF |
|
26 | William D. Neumann |
HORSE: An Extension of an r-Time Signature Scheme With Fast Signing and Verification. |
ITCC (1) |
2004 |
DBLP DOI BibTeX RDF |
r-time signatures, low power authentication, ad hoc wireless networks, hash chains, broadcast authentication |
26 | Jan Camenisch, Anna Lysyanskaya |
Signature Schemes and Anonymous Credentials from Bilinear Maps. |
CRYPTO |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Yuefei Zhu, Dan Xu |
An Efficient Key-Evolving Signature Scheme Based on Pairing. |
FTDCS |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Xin Lü, Dengguo Feng |
An Arbitrated Quantum Message Signature Scheme. |
CIS |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Zhenchuan Chai, Zhenfu Cao |
Factoring-Based Proxy Signature Schemes with Forward-Security. |
CIS |
2004 |
DBLP DOI BibTeX RDF |
|
26 | Guilin Wang, Jianying Zhou 0001, Robert H. Deng |
On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. |
TrustBus |
2004 |
DBLP DOI BibTeX RDF |
digital signatures, cryptographic protocols, undeniable signatures |
26 | Jonathan Katz, Nan Wang 0001 |
Efficiency improvements for signature schemes with tight security reductions. |
CCS |
2003 |
DBLP DOI BibTeX RDF |
digital signatures |
26 | Jacques Stern, Julien P. Stern |
Cryptanalysis of the OTM Signature Scheme from FC'02. |
Financial Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Josef Pieprzyk, Huaxiong Wang, Chaoping Xing |
Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks. |
Selected Areas in Cryptography |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Heeyong Kwon, E. Y. Ha, H. Y. Hwang |
Online Signature Verification Based on Dynamic Feature Segmentation and 3-Step Matching. |
IDEAL |
2003 |
DBLP DOI BibTeX RDF |
|
26 | Takeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto |
A Fast Signature Scheme Based on New On-line Computation. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
Displaying result #601 - #700 of 13353 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ 16][ >>] |
|