Showing results 13 to 22 of 22
< previous
Title | Author(s) | Issue Date | |
---|---|---|---|
Multiplicative forward-secure threshold signature scheme Journal:International Journal of Network Security | 2008 | ||
PE(AR)2: privacy-enhanced anonymous authentication with reputation and revocation Proceeding/Conference:Lecture Notes in Computer Science | 2012 | ||
Practical electronic lotteries with offline TTP Journal:Computer Communications | 2006 | ||
Related randomness attacks for public key crypto systems Proceeding/Conference:ASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security | 2015 | ||
Role activation management in role based access control Proceeding/Conference:Lecture Notes in Computer Science | 2005 | ||
Secure hierarchical identity based signature and its application Journal:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2004 | ||
Separable and anonymous identity-based key issuing Proceeding/Conference:Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS | 2005 | ||
SPICE - simple privacy-preserving identity-management for cloud environment Proceeding/Conference:Lecture Notes in Computer Science | 2012 | ||
Timed-release encryption revisited Proceeding/Conference:Lecture Notes in Computer Science | 2008 | ||
Two improved partially blind signature schemes from bilinear pairings Proceeding/Conference:Lecture Notes in Computer Science | 2005 |