kw.\*:("Signature")
Results 1 to 25 of 5457
Selection :
Improvement on Hwang et al.'s generalization of proxy signature schemes based on elliptic curvesHWANG, Shin-Jia; HUANG, Chia-Wei.Applied mathematics and computation. 2005, Vol 170, Num 2, pp 941-947, issn 0096-3003, 7 p.Article
On the security of Miyaji et al. group signature schemeJIANHONG ZHANG; YUMIN WANG.Applied mathematics and computation. 2005, Vol 167, Num 2, pp 1373-1382, issn 0096-3003, 10 p.Article
An improvement of delegated multisignature scheme with document decompositionCHANG, Chin-Chen; LIN, Juon-Chang.Operating systems review. 2004, Vol 38, Num 4, pp 52-57, issn 0163-5980, 6 p.Article
Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attackHSU, Chien-Lung; WU, Tzong-Sun.Applied mathematics and computation. 2005, Vol 168, Num 1, pp 305-319, issn 0096-3003, 15 p.Article
Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signersQI XIE.Applied mathematics and computation. 2005, Vol 168, Num 2, pp 776-782, issn 0096-3003, 7 p.Article
Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi- signature scheme with shared verificationHAIYONG BAO; ZHENFU CAO; SHENGBAO WANG et al.Applied mathematics and computation. 2005, Vol 169, Num 2, pp 1419-1430, issn 0096-3003, 12 p.Article
Cryptanalysis of an identity-based society oriented signature scheme with anonymous signersZUHUA SHAO.Information processing letters. 2003, Vol 86, Num 6, pp 295-298, issn 0020-0190, 4 p.Article
On the security of a convertible group signature schemeSAEEDNIA, S.Information processing letters. 2000, Vol 73, Num 3-4, pp 93-96, issn 0020-0190Article
A remote password authentication scheme based on the digital signature methodHWANG, M.-S.International journal of computer mathematics. 1999, Vol 70, Num 4, pp 657-666, issn 0020-7160Article
Improved digital signature suitable for batch verificationSUNG-MING YEN; CHI-SUNG LAIH.IEEE transactions on computers. 1995, Vol 44, Num 7, pp 957-959, issn 0018-9340Article
Cryptanalysis of Zhou et al.'s proxy-protected signature schemesJE HONG PARK; BO GYEONG KANG; JAE WOO HAN et al.Applied mathematics and computation. 2005, Vol 169, Num 1, pp 192-197, issn 0096-3003, 6 p.Article
Security of Lu et al.'s proxy-protected signature schemeJE HONG PARK; BO GYEONG KANG.Applied mathematics and computation. 2005, Vol 169, Num 2, pp 1010-1015, issn 0096-3003, 6 p.Article
A new proxy blind signature schemeKAI FAN; YUE WANG; HUI LI et al.International journal of grid and utility computing (Print). 2012, Vol 3, Num 1, pp 38-42, issn 1741-847X, 5 p.Article
Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03FANGGUO ZHANG; SAFAVI-NAINI, Reihaneh; SUSILO, Willy et al.Applied mathematics and computation. 2005, Vol 170, Num 2, pp 1166-1169, issn 0096-3003, 4 p.Article
A Forward-Backward Secure Signature SchemeLIN, Dai-Rui; WANG, Chih-I; GUAN, D. J et al.Journal of information science and engineering. 2010, Vol 26, Num 6, pp 2319-2329, issn 1016-2364, 11 p.Article
On the security of the Lee-Chang group signature scheme and its derivativesJOYE, M; LEE, N.-Y; HWANG, T et al.Lecture notes in computer science. 1999, pp 47-51, issn 0302-9743, isbn 3-540-66695-8Conference Paper
Some open issues and new directions in group signaturesATENIESE, G; TSUDIK, G.Lecture notes in computer science. 1999, pp 196-211, issn 0302-9743, isbn 3-540-66362-2Conference Paper
Security of Hsu-Wu's authenticated encryption scheme with (t,n) shared verificationHWANG, Shin-Jia; LIAO, Hao-Chih.Applied mathematics and computation. 2005, Vol 167, Num 1, pp 281-285, issn 0096-3003, 5 p.Article
Repairing ElGamal-like multi-signature schemes using self-certified public keysHWANG, Shin-Jia; LEE, Yun-Hua.Applied mathematics and computation. 2004, Vol 156, Num 1, pp 73-83, issn 0096-3003, 11 p.Article
Meta-He digital signatures based on factoring and discrete logarithmsPON, Shun-Fu; LU, Erl-Huei; JENG, Albert B et al.Applied mathematics and computation. 2005, Vol 165, Num 1, pp 171-176, issn 0096-3003, 6 p.Article
Proxy blind multi-signature scheme without a secure channelRONGXING LU; ZHENFU CAO; YUAN ZHOU et al.Applied mathematics and computation. 2005, Vol 164, Num 1, pp 179-187, issn 0096-3003, 9 p.Article
Weakness in quaternion signaturesCOPPERSMITH, Don.Journal of cryptology. 2001, Vol 14, Num 2, pp 77-85, issn 0933-2790Article
Towards the forgery of a group signature without knowing the group center's secretCHANG, Chin-Chen; HWANG, Kuo-Feng.Lecture notes in computer science. 2001, pp 47-51, issn 0302-9743, isbn 3-540-42880-1Conference Paper
Sanitizable signaturesATENIESE, Giuseppe; CHOU, Daniel H; DE MEDEIROS, Breno et al.Lecture notes in computer science. 2005, pp 159-177, issn 0302-9743, isbn 3-540-28963-1, 1Vol, 19 p.Conference Paper
Provably secure distributed schnorr signatures and a (t, n) threshold scheme for implicit certificatesSTINSON, Douglas R; STROBL, Reto.Lecture notes in computer science. 2001, pp 417-434, issn 0302-9743, isbn 3-540-42300-1Conference Paper