Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Firma")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 2499

  • Page / 100
Export

Selection :

  • and

Cryptanalysis of an identity-based society oriented signature scheme with anonymous signersZUHUA SHAO.Information processing letters. 2003, Vol 86, Num 6, pp 295-298, issn 0020-0190, 4 p.Article

Linkability of a Blind Signature Scheme and Its Improved SchemeJIANHONG ZHANG; TAO WEI; JIANYU ZHANG et al.Lecture notes in computer science. 2006, pp 262-270, issn 0302-9743, isbn 3-540-34070-X, 9 p.Conference Paper

Round-optimal composable blind signatures in the common reference string modelFISCHLIN, Marc.Lecture notes in computer science. 2006, pp 60-77, issn 0302-9743, isbn 3-540-37432-9, 1Vol, 18 p.Conference Paper

Which new RSA-signatures can be computed from certain given RSA-signatures?EVERTSE, J.-H; VAN HEYST, E.Journal of cryptology. 1992, Vol 5, Num 1, pp 41-52, issn 0933-2790Conference Paper

signature électronique: des solutions de confianceTEXIER, Bruno.Archimag (Vincennes). 2013, Num 263, pp 33-34, issn 0769-0975, 2 p.Article

On the TYS Signature SchemeJOYE, Marc; LIN, Hung-Mei.Lecture notes in computer science. 2006, pp 338-344, issn 0302-9743, isbn 3-540-34070-X, 7 p.Conference Paper

Compressing Rabin signaturesBLEICHENBACHER, Daniel.Lecture notes in computer science. 2004, pp 126-128, issn 0302-9743, isbn 3-540-20996-4, 3 p.Conference Paper

Securing return routability protocol against active attackHUAFEI ZHU; FENG BAO; DENG, Robert H et al.IEEE Vehicular Technology Conference. 2004, pp 3254-3257, isbn 0-7803-8521-7, 4 p.Conference Paper

A System for Signature Verification Based on Horizontal and Vertical Components in Hand GesturesOH, Beom-Seok; JEHYOUNG JEON; TOH, Kar-Ann et al.IEEE intelligent systems. 2013, Vol 28, Num 6, pp 52-55, issn 1541-1672, 4 p.Article

Identity-based aggregate and verifiably encrypted signatures from bilinear pairingXIANGGUO CHENG; JINGMEI LIU; XINMEI WANG et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-25860-4, 4Vol, part IV, 1046-1054Conference Paper

DSA type secure interactive batch verification protocolsHARN, L.Electronics Letters. 1995, Vol 31, Num 4, pp 257-258, issn 0013-5194Article

Imaging radar polarization signatures: theory and observationVAN ZYL, J. J; ZEBKER, H. A; ELACHI, C et al.Radio science. 1987, Vol 22, Num 4, pp 529-543, issn 0048-6604Article

A public key cryptosystem and a signature scheme based on discrete logarithmsTAHER ELGAMAL.IEEE transactions on information theory. 1985, Vol 31, Num 4, pp 469-472, issn 0018-9448Article

Weakness in quaternion signaturesCOPPERSMITH, D.Lecture notes in computer science. 1999, pp 305-314, issn 0302-9743, isbn 3-540-66347-9Conference Paper

An interactive identification scheme based on discrete logarithms and factoringBRICKELL, E. F; MCCURLEY, K. S.Journal of cryptology. 1992, Vol 5, Num 1, pp 29-39, issn 0933-2790Conference Paper

Digital signature with (t,n) shared verification based on discrete logarithmsLEE, W.-B; CHANG, C.-C; HARN, L et al.Electronics Letters. 1995, Vol 31, Num 3, pp 176-177, issn 0013-5194Article

Strong non-repudiation based on certificateless short signaturesCHEN, Yu-Chi; GWOBOA HORNG; LIU, Chao-Liang et al.IET information security (Print). 2013, Vol 7, Num 3, pp 253-263, issn 1751-8709, 11 p.Article

Revised fischlin's (blind) signature schemesKEWEI LV.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-30818-0, 2Vol, Part 2, 96-103Conference Paper

Offer privacy in mobile agents using conditionally anonymous digital signaturesMING YAO; HENRICKSEN, Matt; FOO, Ernest et al.Lecture notes in computer science. 2004, pp 132-141, issn 0302-9743, isbn 3-540-22919-1, 10 p.Conference Paper

A new efficient ID-based proxy blind signature schemeWEIMIN LANG; YUNMENG TAN; ZONGKAI YANG et al.IEEE symposium on computers communications. 2004, isbn 0-7803-8623-X, 2Vol, vol1, 407-411Conference Paper

Le point de vue technique sur la signature électronique = Technical aspects of electronic signatureVINH-TUNG, C.Spectra biologie. 2001, Vol 20, Num 116, pp 48-50, issn 0295-1967Article

A new proxy blind signature schemeKAI FAN; YUE WANG; HUI LI et al.International journal of grid and utility computing (Print). 2012, Vol 3, Num 1, pp 38-42, issn 1741-847X, 5 p.Article

Skelettreste der mittleren Bronzezeit, der älteren Urnenfelderzeit sowie der Römerzeit in Wien 23, Sulzengasse = Skeleton Remains Dating back to the Middle Bronze Age, the Early Urnfield Culture and the Roman Period - Vienna 23, SulzengasseKIRCHENGAST, S.Archaeologia Austriaca. 1994, Vol 78, pp 57-68, issn 0003-8008Article

Security analysis of IKE's signature-based key-exchange protocolCANETTI, Ran; KRAWCZYK, Hugo.Lecture notes in computer science. 2002, pp 143-161, issn 0302-9743, isbn 3-540-44050-X, 19 p.Conference Paper

Two improved partially blind signature schemes from bilinear pairingsCHOW, Sherman S. M; HUI, Lucas C. K; YIU, S. M et al.Lecture notes in computer science. 2005, pp 316-328, issn 0302-9743, isbn 3-540-26547-3, 13 p.Conference Paper

  • Page / 100