Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Signature")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 5457

  • Page / 219
Export

Selection :

  • and

Improvement on Hwang et al.'s generalization of proxy signature schemes based on elliptic curvesHWANG, Shin-Jia; HUANG, Chia-Wei.Applied mathematics and computation. 2005, Vol 170, Num 2, pp 941-947, issn 0096-3003, 7 p.Article

On the security of Miyaji et al. group signature schemeJIANHONG ZHANG; YUMIN WANG.Applied mathematics and computation. 2005, Vol 167, Num 2, pp 1373-1382, issn 0096-3003, 10 p.Article

An improvement of delegated multisignature scheme with document decompositionCHANG, Chin-Chen; LIN, Juon-Chang.Operating systems review. 2004, Vol 38, Num 4, pp 52-57, issn 0163-5980, 6 p.Article

Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attackHSU, Chien-Lung; WU, Tzong-Sun.Applied mathematics and computation. 2005, Vol 168, Num 1, pp 305-319, issn 0096-3003, 15 p.Article

Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signersQI XIE.Applied mathematics and computation. 2005, Vol 168, Num 2, pp 776-782, issn 0096-3003, 7 p.Article

Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi- signature scheme with shared verificationHAIYONG BAO; ZHENFU CAO; SHENGBAO WANG et al.Applied mathematics and computation. 2005, Vol 169, Num 2, pp 1419-1430, issn 0096-3003, 12 p.Article

Cryptanalysis of an identity-based society oriented signature scheme with anonymous signersZUHUA SHAO.Information processing letters. 2003, Vol 86, Num 6, pp 295-298, issn 0020-0190, 4 p.Article

On the security of a convertible group signature schemeSAEEDNIA, S.Information processing letters. 2000, Vol 73, Num 3-4, pp 93-96, issn 0020-0190Article

A remote password authentication scheme based on the digital signature methodHWANG, M.-S.International journal of computer mathematics. 1999, Vol 70, Num 4, pp 657-666, issn 0020-7160Article

Improved digital signature suitable for batch verificationSUNG-MING YEN; CHI-SUNG LAIH.IEEE transactions on computers. 1995, Vol 44, Num 7, pp 957-959, issn 0018-9340Article

Cryptanalysis of Zhou et al.'s proxy-protected signature schemesJE HONG PARK; BO GYEONG KANG; JAE WOO HAN et al.Applied mathematics and computation. 2005, Vol 169, Num 1, pp 192-197, issn 0096-3003, 6 p.Article

Security of Lu et al.'s proxy-protected signature schemeJE HONG PARK; BO GYEONG KANG.Applied mathematics and computation. 2005, Vol 169, Num 2, pp 1010-1015, issn 0096-3003, 6 p.Article

A new proxy blind signature schemeKAI FAN; YUE WANG; HUI LI et al.International journal of grid and utility computing (Print). 2012, Vol 3, Num 1, pp 38-42, issn 1741-847X, 5 p.Article

Attack on Han et al.'s ID-based confirmer (undeniable) signature at ACM-EC'03FANGGUO ZHANG; SAFAVI-NAINI, Reihaneh; SUSILO, Willy et al.Applied mathematics and computation. 2005, Vol 170, Num 2, pp 1166-1169, issn 0096-3003, 4 p.Article

A Forward-Backward Secure Signature SchemeLIN, Dai-Rui; WANG, Chih-I; GUAN, D. J et al.Journal of information science and engineering. 2010, Vol 26, Num 6, pp 2319-2329, issn 1016-2364, 11 p.Article

On the security of the Lee-Chang group signature scheme and its derivativesJOYE, M; LEE, N.-Y; HWANG, T et al.Lecture notes in computer science. 1999, pp 47-51, issn 0302-9743, isbn 3-540-66695-8Conference Paper

Some open issues and new directions in group signaturesATENIESE, G; TSUDIK, G.Lecture notes in computer science. 1999, pp 196-211, issn 0302-9743, isbn 3-540-66362-2Conference Paper

Security of Hsu-Wu's authenticated encryption scheme with (t,n) shared verificationHWANG, Shin-Jia; LIAO, Hao-Chih.Applied mathematics and computation. 2005, Vol 167, Num 1, pp 281-285, issn 0096-3003, 5 p.Article

Repairing ElGamal-like multi-signature schemes using self-certified public keysHWANG, Shin-Jia; LEE, Yun-Hua.Applied mathematics and computation. 2004, Vol 156, Num 1, pp 73-83, issn 0096-3003, 11 p.Article

Meta-He digital signatures based on factoring and discrete logarithmsPON, Shun-Fu; LU, Erl-Huei; JENG, Albert B et al.Applied mathematics and computation. 2005, Vol 165, Num 1, pp 171-176, issn 0096-3003, 6 p.Article

Proxy blind multi-signature scheme without a secure channelRONGXING LU; ZHENFU CAO; YUAN ZHOU et al.Applied mathematics and computation. 2005, Vol 164, Num 1, pp 179-187, issn 0096-3003, 9 p.Article

Weakness in quaternion signaturesCOPPERSMITH, Don.Journal of cryptology. 2001, Vol 14, Num 2, pp 77-85, issn 0933-2790Article

Towards the forgery of a group signature without knowing the group center's secretCHANG, Chin-Chen; HWANG, Kuo-Feng.Lecture notes in computer science. 2001, pp 47-51, issn 0302-9743, isbn 3-540-42880-1Conference Paper

Sanitizable signaturesATENIESE, Giuseppe; CHOU, Daniel H; DE MEDEIROS, Breno et al.Lecture notes in computer science. 2005, pp 159-177, issn 0302-9743, isbn 3-540-28963-1, 1Vol, 19 p.Conference Paper

Provably secure distributed schnorr signatures and a (t, n) threshold scheme for implicit certificatesSTINSON, Douglas R; STROBL, Reto.Lecture notes in computer science. 2001, pp 417-434, issn 0302-9743, isbn 3-540-42300-1Conference Paper

  • Page / 219