Showing results 78 to 83 of 83
< previous
Title | Author(s) | Issue Date | Views | |
---|---|---|---|---|
Threshold ring signature without random oracles Proceeding/Conference:Proceedings of the 6th International Symposium on Information, Computer and Communications Security, ASIACCS 2011 | 2011 | 17 | ||
Towards a cryptographic treatment of publish/subscribe systems Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2010 | 7 | ||
Towards a cryptographic treatment of publish/subscribe systems Journal:Journal of Computer Security | 2014 | 15 | ||
Traceable and retrievable identity-based encryption Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2008 | 11 | ||
Two-party (blind) ring signatures and their applications Proceeding/Conference:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | 8 | ||
Visual authentication based on visual cryptography using mobile devices Book:Protecting Mobile Networks and Devices: Challenges and Solutions | 2016 | 48 |