The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for Signature with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1971-1980 (15) 1981-1982 (15) 1983-1984 (35) 1985-1986 (30) 1987 (19) 1988 (44) 1989 (43) 1990 (65) 1991 (49) 1992 (54) 1993 (67) 1994 (83) 1995 (90) 1996 (115) 1997 (126) 1998 (144) 1999 (181) 2000 (185) 2001 (254) 2002 (286) 2003 (409) 2004 (613) 2005 (727) 2006 (689) 2007 (770) 2008 (753) 2009 (654) 2010 (394) 2011 (422) 2012 (397) 2013 (450) 2014 (440) 2015 (431) 2016 (424) 2017 (444) 2018 (470) 2019 (570) 2020 (563) 2021 (534) 2022 (544) 2023 (576) 2024 (179)
Publication types (Num. hits)
article(5596) book(4) data(6) incollection(100) inproceedings(7574) phdthesis(73)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 5777 occurrences of 2201 keywords

Results
Found 13353 publication records. Showing 13353 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
27John M. Boyer Bulletproof business process automation: securing XML forms with document subset signatures. Search on Bibsonomy XML Security The full citation details ... 2003 DBLP  DOI  BibTeX  RDF XFDL, XML signature transforms, secure XML forms, XForms
27Henri Gilbert, Marine Minier Cryptanalysis of SFLASH. Search on Bibsonomy EUROCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF asymmetric signature, cryptanalysis, multivariate polynomials, SFLASH
27Chin-Chen Chang 0001, Ju Yuan Hsiao, Chi-Lung Chiang An Image Copyright Protection Scheme Based on Torus Automorphism. Search on Bibsonomy CW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF torus automorphism, Watermark, digital signature
27Jean-Sébastien Coron, Marc Joye, David Naccache, Pascal Paillier Universal Padding Schemes for RSA. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Probabilistic Signature Scheme, Provable Security
27Hyo-Chang Nam, Jong Kim 0001, Sung Je Hong, Sunggu Lee Reliable Probabilistic Checkpointing. Search on Bibsonomy PRDC The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Signature generation function, Performance analysis, Checkpointing, Aliasing, Failure recovery
27Lawrence O'Gorman, Irina Rabinovich Secure Identification Documents Via Pattern Recognition and Public-Key Cryptography. Search on Bibsonomy IEEE Trans. Pattern Anal. Mach. Intell. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Document authentication, document image recognition, photo signature, photo-ID documents, ID cards, pattern recognition, cryptography, counterfeiting
27Peter A. Moldovyanu, E. Dernova, A. Kostina, Nick A. Moldovyan Multisignature Protocols and Problem of Simultaneous Signing a Package of Contracts. Search on Bibsonomy IF&GIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Collective digital signature, multisignature schemes, Digital signature, Public key, Finite group, Discrete logarithm problem
27D. S. Guru, H. N. Prakash, T. N. Vikram Spatial Topology of Equitemporal Points on Signatures for Retrieval. Search on Bibsonomy PReMI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Signature retrieval, Online Signature, Spatial similarity
27Xiangxue Li, Dong Zheng 0001, Kefei Chen Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register. Search on Bibsonomy ICA3PP The full citation details ... 2007 DBLP  DOI  BibTeX  RDF characteristic sequence, linkable ring signature, linear feedback shift-register, threshold signature
27Huafei Zhu, Feng Bao 0001, Robert H. Deng Sequential Aggregate Signatures Working over Independent Homomorphic Trapdoor One-Way Permutation Domains. Search on Bibsonomy ICICS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Homomorphic trapdoor one-way permutation, sequential aggregate signature, signature scheme
27István Zsolt Berta, Levente Buttyán, István Vajda Mitigating the Untrusted Terminal Problem Using Conditional Signatures. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF untrusted terminal, conditional signature, smart card, message authentication, electronic signature
27Ming-Der Shieh, Hsin-Fu Lo, Ming-Hwa Sheu High-speed generation of LFSR signatures. Search on Bibsonomy Asian Test Symposium The full citation details ... 2000 DBLP  DOI  BibTeX  RDF high-speed generation, LFSR signatures, compaction simulation, single-input signature register, equivalent multiple-input implementation, finite field theory, high-speed signature computations, lookahead technique, internal-XOR LFSR, external-XOR LFSR, performance evaluation, logic testing, built-in self test, integrated circuit testing, automatic test pattern generation, BIST, linear feedback shift register, binary sequences, subsequences
27Nirmal R. Saxena, Edward J. McCluskey Parallel Signatur Analysis Design with Bounds on Aliasing. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1997 DBLP  DOI  BibTeX  RDF aliasing probability bounds, parallel signature designs, multiple input signature registers (MISR), linear feedback shift registers, random testing, Signature analysis
27Shambhu J. Upadhyaya, Bina Ramamurthy Concurrent Process Monitoring with No Reference Signatures. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 1994 DBLP  DOI  BibTeX  RDF concurrent process monitoring, signature technique, compilation phase, signature checking, controllable latency, branch-free interval, error coverage, sequencing errors, fault tolerant computing, controllability, program testing, signature analysis, control flow graph, error checking, bit errors, watchdog processor, error latency
26Smita Krishnaswamy, Stephen Plaza, Igor L. Markov, John P. Hayes Signature-Based SER Analysis and Design of Logic Circuits. Search on Bibsonomy IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Jingran Wang, Haifeng Qian An Optimal Blind Signature Padding with Message Recovery. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Yuh-Min Tseng, Tsu-Yang Wu, Jui-Di Wu Towards Efficient ID-Based Signature Schemes with Batch Verifications from Bilinear Pairings. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka Yet Another Sanitizable Signature from Bilinear Maps. Search on Bibsonomy ARES The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Kar Way Tan, Robert H. Deng Applying Sanitizable Signature to Web-Service-Enabled Business Processes: Going Beyond Integrity Protection. Search on Bibsonomy ICWS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Jonathan Katz, Vinod Vaikuntanathan Signature Schemes with Bounded Leakage Resilience. Search on Bibsonomy ASIACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Danjun Pu, Gregory R. Ball, Sargur N. Srihari A Machine Learning Approach to Off-Line Signature Verification Using Bayesian Inference. Search on Bibsonomy IWCF The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Jianhong Zhang, Hua Chen, Qin Geng Efficient and Provably Secure Self-certified Signature Scheme. Search on Bibsonomy AMT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Enrique Argones-Rúa, David Pérez-Piñar López, José Luis Alba-Castro Ergodic HMM-UBM System for On-Line Signature Verification. Search on Bibsonomy COST 2101/2102 Conference The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Giuseppe Pirlo, Donato Impedovo, Erasmo Stasolla, Claudia Adamita Trullo Learning Local Correspondences for Static Signature Verification. Search on Bibsonomy AI*IA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
26Alexandra Boldyreva, Craig Gentry, Adam O'Neill, Dae Hyun Yum New Multiparty Signature Schemes for Network Routing Applications. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF network security, digital signatures, pairings, identity-based signatures, multisignatures, aggregate signatures
26Ismail A. Ismail, Mohammed A. Ramadan, Talaat El Danf, Ahmed H. Samak Automatic Signature Recognition and Verification Using Principal Components Analysis. Search on Bibsonomy CGIV The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Xiaodong Lin 0001, Rongxing Lu, Haojin Zhu, Pin-Han Ho, Xuemin Shen Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Marcos Martinez-Diaz, Julian Fiérrez-Aguilar, Javier Galbally, Javier Ortega-Garcia Towards mobile authentication using dynamic signature verification: Useful features and performance evaluation. Search on Bibsonomy ICPR The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Fengtao Xiao, Huaping Hu, Xin Chen, Bo Liu 0014 ASG Automated Signature Generation for Worm-Like P2P Traffic Patterns. Search on Bibsonomy WAIM The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Thomas Plantard, Willy Susilo, Khin Than Win A Digital Signature Scheme Based on CVPinfinity. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Pierre-Alain Fouque, Gilles Macario-Rat, Ludovic Perret, Jacques Stern Total Break of the l-IC Signature Scheme. Search on Bibsonomy Public Key Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Zoe Lin Jiang, Siu-Ming Yiu, Lucas Chi Kwong Hui, Y. Dong, Starsky H. Y. Wong Chained Threshold Proxy Signature without and with Supervision. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Xuanwu Zhou, Ping Wei 0005 Anonymous Proxy Authorization Signature Scheme with Forward Security. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Yanlin Qin, Xiaoping Wu Cryptanalysis and Improvement of Two Blind Proxy Signature Schemes. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Youan Xiao, Zude Zhou A New Kind of Self-Certified Proxy Digital Signature Scheme. Search on Bibsonomy CSSE (3) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Hao Tu, Zhitang Li, Bin Liu 0013 Mining Network Traffic for Worm Signature Extraction. Search on Bibsonomy FSKD (4) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Emanuele Maiorana, Patrizio Campisi, Alessandro Neri 0001 Template Protection for On-Line Signature-Based Recognition Systems. Search on Bibsonomy BIOID The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Susanta Nanda, Tzi-cker Chiueh Execution Trace-Driven Automated Attack Signature Generation. Search on Bibsonomy ACSAC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Kok Wai Wong, Tamás D. Gedeon, László T. Kóczy Fuzzy Signature and Cognitive Modelling for Complex Decision Model. Search on Bibsonomy IFSA (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Ping Han, Yanqin Zhu, Yuemei Hu Design of Multi-signature Scheme in Wireless Networks. Search on Bibsonomy ACIS-ICIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Kyu Young Choi, Jong Hwan Park, Jung Yeon Hwang, Dong Hoon Lee 0001 Efficient Certificateless Signature Schemes. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Mehdi Salour, Xiao Su Dynamic Two-Layer Signature-Based IDS with Unequal Databases. Search on Bibsonomy ITNG The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Wei Wu 0001, Yi Mu 0001, Willy Susilo, Jennifer Seberry, Xinyi Huang 0001 Identity-Based Proxy Signature from Pairings. Search on Bibsonomy ATC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Chengyu Hu, Daxing Li A New Type of Proxy Ring Signature Scheme with Revocable Anonymity. Search on Bibsonomy SNPD (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Yong Li 0002, Huiyan Chen Efficient Identity-based Signature Scheme with Partial Message Recovery. Search on Bibsonomy SNPD (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Rupeng Li, Xianghua Du, Guowen Li, Jia Yu 0005, Daxing Li Key-Insulated Group Signature Scheme with Selective Revocation. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Vu Nguyen 0002, Michael Blumenstein, Vallipuram Muthukkumarasamy, Graham Leedham Off-line Signature Verification Using Enhanced Modified Direction Features in Conjunction with Neural Classifiers and Support Vector Machines. Search on Bibsonomy ICDAR The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
26Haiyong Bao, Zhenfu Cao, Shengbao Wang Identity-Based Threshold Proxy Signature Scheme with Known Signers. Search on Bibsonomy TAMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Siyuan Chen, Sargur N. Srihari A New Off-line Signature Verification Method based on Graph. Search on Bibsonomy ICPR (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Stephane Armand, Michael Blumenstein, Vallipuram Muthukkumarasamy Off-line Signature Verification based on the Modified Direction Feature. Search on Bibsonomy ICPR (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Chik How Tan Public-Key Encryption from ID-Based Encryption Without One-Time Signature. Search on Bibsonomy OTM Workshops (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptography, public key encryption, bilinear maps
26Jiguo Li 0001, Yichen Zhang 0003, Zhijian Wang Improvement of Threshold Signature Scheme Using Self-Certified Public Key. Search on Bibsonomy ICICIC (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Alain Wahl, Jean Hennebert, Andreas Humm, Rolf Ingold Generation and Evaluation of Brute-Force Signature Forgeries. Search on Bibsonomy MRCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Yuan Zhou, Zhenfu Cao, Zhenchuan Chai Identity Based Key Insulated Signature. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Jianhong Zhang, Tao Wei, Jianyu Zhang, Wei Zou Linkability of a Blind Signature Scheme and Its Improved Scheme. Search on Bibsonomy ICCSA (4) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Rongxing Lu, Zhenfu Cao, Xiaolei Dong, Renwang Su Designated Verifier Proxy Signature Scheme from Bilinear Pairings. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Zheng Gong, Xiangxue Li, Kefei Chen Efficient Partially Blind Signature Scheme with Provable Security. Search on Bibsonomy COCOON The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Frederik Vanhaverbeke, Marc Moeneclaey Optimal signature sets for oversaturated quasi-scalable direct-sequence spread-spectrum systems. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26George N. Karystinos, Dimitrios A. Pados The maximum squared correlation, sum capacity, and total asymptotic efficiency of minimum total-squared-correlation binary signature sets. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Qibin Sun, Shih-Fu Chang A secure and robust digital signature scheme for JPEG2000 image authentication. Search on Bibsonomy IEEE Trans. Multim. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Jian Liao, Junfang Xiao, Yinghao Qi, Peiwei Huang, Mentian Rong ID-Based Signature Scheme Without Trusted PKG. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26M. Wirotius, Jean-Yves Ramel, Nicole Vincent Distance and Matching for Authentication by On-Line Signature. Search on Bibsonomy AutoID The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Qin Wang, Zhenfu Cao, Shengbao Wang Formalized Security Model of Multi-Proxy Signature Schemes. Search on Bibsonomy CIT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Jin Kim, Hyuk Cho, Eui Cha A Study on Enhanced Dynamic Signature Verification for the Embedded System. Search on Bibsonomy BVAI The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Bon K. Sy Signature-Based Approach for Intrusion Detection. Search on Bibsonomy MLDM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Cemil Öz Signature Recognition and Verification with Artificial Neural Network Using Moment Invariant Method. Search on Bibsonomy ISNN (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Canan Senol, Tülay Yildirim Signature Verification Using Conic Section Function Neural Network. Search on Bibsonomy ISCIS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Xinge You, Bin Fang 0001, Zhenyu He 0001, Yuan Yan Tang Similarity Measurement for Off-Line Signature Verification. Search on Bibsonomy ICIC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Hong-Wei Ji, Zhong-Hua Quan Signature Verification Using Wavelet Transform and Support Vector Machine. Search on Bibsonomy ICIC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Farid Ahmed, Ira S. Moskowitz Composite signature based watermarking for fingerprint authentication. Search on Bibsonomy MM&Sec The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Phasemark™, composite filter, phase only filter, watermarking, fingerprint, biometric authentication
26Ching Yu Ng, Willy Susilo, Yi Mu 0001 Universal Designated Multi Verifier Signature Schemes. Search on Bibsonomy ICPADS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Chunxiang Gu, Yuefei Zhu Provable Security of ID-Based Proxy Signature Schemes. Search on Bibsonomy ICCNMC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Duc-Liem Vo, Kwangjo Kim Yet Another Forward Secure Signature from Bilinear Pairings. Search on Bibsonomy ICISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF key evolution, pairings, Forward security, key exposure
26Sung-Hyun Yun, Hyung-Woo Lee The Large Scale Electronic Voting Scheme Based on Undeniable Multi-signature Scheme. Search on Bibsonomy ICCSA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Ray R. Hashemi, Joshua H. Early, Mahmood Bahar, Alexander A. Tyler, John F. Young A Signature-Based Liver Cancer Predictive System. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Liver Cancer, Carcinogenic Potency Database, Self-organizing Map (SOM) and Hopfield Net, Predictive Systems
26Shaohua Tang Simple Threshold RSA Signature Scheme Based on Simple Secret Sharing. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Richard M. Guest, Michael C. Fairhurst, Claus Vielhauer Towards a Flexible Framework for Open Source Software for Handwritten Signature Analysis. Search on Bibsonomy GfKl The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Liang Wan, Bin Wan On-Line Signature Verification With Two-Stage Statistical Models. Search on Bibsonomy ICDAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Vanesa Daza, Javier Herranz, Germán Sáez Protocols useful on the Internet from distributed signature schemes. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Distributed signatures, Metering schemes, Distributed key distribution schemes
26Xian-Sheng Hua 0001, Xian Chen, HongJiang Zhang Robust video signature based on ordinal measure. Search on Bibsonomy ICIP The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Javier Herranz, Germán Sáez Ring Signature Schemes for General Ad-Hoc Access Structures. Search on Bibsonomy ESAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Ran Canetti, Oded Goldreich 0001, Shai Halevi On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Ran Canetti Universally Composable Signature, Certification, and Authentication. Search on Bibsonomy CSFW The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Qingshui Xue, Zhenfu Cao Improvement of Multi-Proxy Signature Scheme. Search on Bibsonomy CIT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Michael Backes 0001, Dennis Hofheinz How to Break and Repair a Universally Composable Signature Functionality. Search on Bibsonomy ISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Jing Xu 0002, Zhenfeng Zhang, Dengguo Feng A Ring Signature Scheme Using Bilinear Pairings. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Robert Kofler, Robert Krimmer, Alexander Prosser, Martin Karl Unger The Role of Digital Signature Cards in Electronic Voting. Search on Bibsonomy HICSS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Stanislaw Jarecki, Nitesh Saxena, Jeong Hyun Yi An attack on the proactive RSA signature scheme in the URSA ad hoc network access control protocol. Search on Bibsonomy SASN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF proactive cryptosystems, peer-to-peer, mobile ad-hoc networks, admission control, RSA, group membership, threshold cryptosystems
26Yung-Yuan Chen, Kun-Feng Chen Incorporating Signature-Monitoring Technique in VLIW Processors. Search on Bibsonomy DFT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26William D. Neumann HORSE: An Extension of an r-Time Signature Scheme With Fast Signing and Verification. Search on Bibsonomy ITCC (1) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF r-time signatures, low power authentication, ad hoc wireless networks, hash chains, broadcast authentication
26Jan Camenisch, Anna Lysyanskaya Signature Schemes and Anonymous Credentials from Bilinear Maps. Search on Bibsonomy CRYPTO The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Yuefei Zhu, Dan Xu An Efficient Key-Evolving Signature Scheme Based on Pairing. Search on Bibsonomy FTDCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Xin Lü, Dengguo Feng An Arbitrated Quantum Message Signature Scheme. Search on Bibsonomy CIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Zhenchuan Chai, Zhenfu Cao Factoring-Based Proxy Signature Schemes with Forward-Security. Search on Bibsonomy CIS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Guilin Wang, Jianying Zhou 0001, Robert H. Deng On the Security of the Lee-Hwang Group-Oriented Undeniable Signature Schemes. Search on Bibsonomy TrustBus The full citation details ... 2004 DBLP  DOI  BibTeX  RDF digital signatures, cryptographic protocols, undeniable signatures
26Jonathan Katz, Nan Wang 0001 Efficiency improvements for signature schemes with tight security reductions. Search on Bibsonomy CCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF digital signatures
26Jacques Stern, Julien P. Stern Cryptanalysis of the OTM Signature Scheme from FC'02. Search on Bibsonomy Financial Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Josef Pieprzyk, Huaxiong Wang, Chaoping Xing Multiple-Time Signature Schemes against Adaptive Chosen Message Attacks. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Heeyong Kwon, E. Y. Ha, H. Y. Hwang Online Signature Verification Based on Dynamic Feature Segmentation and 3-Step Matching. Search on Bibsonomy IDEAL The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Takeshi Okamoto, Hirofumi Katsuno, Eiji Okamoto A Fast Signature Scheme Based on New On-line Computation. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
Displaying result #601 - #700 of 13353 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license