kw.\*:("One-time signature")
Results 1 to 7 of 7
Selection :
On the security of the Winternitz one-time signature schemeBUCHMANN, Johannes; DAHMEN, Erik; ERETH, Sarah et al.International journal of applied cryptography (Print). 2013, Vol 3, Num 1, pp 84-96, issn 1753-0563, 13 p.Article
Improving Lamport one-time signature schemeCHANG, Ming-Hsin; YEH, Yi-Shiung.Applied mathematics and computation. 2005, Vol 167, Num 1, pp 118-124, issn 0096-3003, 7 p.Article
A one-time signature using run-length encodingSTEINWANDT, Rainer; VILLANYI, Viktoria I.Information processing letters. 2008, Vol 108, Num 4, pp 179-185, issn 0020-0190, 7 p.Article
An efficient and secure event signature (EASES) protocol for peer-to-peer massively multiplayer online gamesCHAN, Mo-Che; HU, Shun-Yun; JIANG, Jehn-Ruey et al.Computer networks (1999). 2008, Vol 52, Num 9, pp 1838-1845, issn 1389-1286, 8 p.Article
Improved server assisted signaturesBICAKCI, Kemal; BAYKAL, Nazife.Computer networks (1999). 2005, Vol 47, Num 3, pp 351-366, issn 1389-1286, 16 p.Article
Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental resultsBRESSON, Emmanuel; CATALANO, Dario; DI RAIMONDO, Mario et al.International journal of information security (Print). 2013, Vol 12, Num 6, pp 439-465, issn 1615-5262, 27 p.Article
Secure Broadcast with One-Time Signatures in Controller Area NetworksGROZA, Bogdan; MURVAY, Pal-Stefan.International journal of mobile computing and multimedia communications. 2013, Vol 5, Num 3, pp 1-18, issn 1937-9412, 18 p.Article