Showing results 1 to 9 of 9
Title | Author(s) | Issue Date | |
---|---|---|---|
Constant-size dynamic k-times anonymous authentication Journal:IEEE Systems Journal | 2013 | ||
Escrowed linkability of ring signatures and its applications Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2006 | ||
Ring signatures without random oracles Proceeding/Conference:Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, ASIACCS '06 | 2006 | ||
Server-aided signatures verification secure against collusion attack Proceeding/Conference:Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011 | 2011 | ||
Server-aided signatures verification secure against collusion attack Proceeding/Conference:Information Security Technical Report | 2013 | ||
Short e-cash Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2005 | ||
Short linkable ring signatures revisited Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2006 | ||
Time-bound anonymous authentication for roaming networks Journal:IEEE Transactions on Information Forensics and Security | 2015 | ||
Towards anonymous ciphertext indistinguishability with identity leakage Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2013 |