History
Year:
-
Type:
Journal
Book
Article
Please fill in your query. A complete syntax description you will find on the General Help page.

Result 21 to 40 from 523 total

Size-efficient digital signatures with appendix by truncating unnecessarily long hashcode. (English)
Chen, Liqun (ed.) et al., Security standardisation research. First international conference, SSR 2014, London, UK, December 16‒17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-14053-7/hbk). Lecture Notes in Computer Science 8893, 69-78 (2014).
WorldCat.org
21
A new signing algorithm based on elliptic curve discrete logarithms and quadratic residue problems. (English)
Ital. J. Pure Appl. Math. 32, 125-132, electronic only (2014).
WorldCat.org
22
Partially known nonces and fault injection attacks on SM2 signature algorithm. (English)
Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27‒30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 343-358 (2014).
WorldCat.org
23
Towards developing secure software using problem-oriented security patterns. (English)
Teufel, Stephanie (ed.) et al., Availability, reliability, and security in information systems. IFIP WG 8.4, 8.9, TC 5 international cross-domain conference, CD-ARES 2014 and 4th international workshop on security and cognitive informatics for homeland defense, SeCIHD 2014, Fribourg, Switzerland, September 8‒12, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-10974-9/pbk). Lecture Notes in Computer Science 8708, 45-62 (2014).
WorldCat.org
24
Breaking the barriers of e-participation: The experience of Russian digital office development. (English)
Kő, Andrea (ed.) et al., Electronic government and the information systems perspective. Third international conference, EGOVIS 2014, Munich, Germany, September 1‒3, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-10177-4/pbk). Lecture Notes in Computer Science 8650, 173-186 (2014).
WorldCat.org
25
A digital signature protocol based on error-correcting codes. (Chinese)
J. Huazhong Univ. Sci. Technol. 42, No. 11, 97-101 (2014).
WorldCat.org
26
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents. (English)
Inf. Process. Lett. 114, No. 1-2, 5-8 (2014).
WorldCat.org
27
An overview of trace based public key cryptography over finite fields. (English)
J. Comput. Appl. Math. 259 B, 599-621 (2014).
WorldCat.org
28
Message transmission for GH-public key cryptosystem. (English)
J. Comput. Appl. Math. 259, Part B, 578-585 (2014).
WorldCat.org
29
A design and realization of digital signature of e-government management website group based on elgamal cipher system. (English)
Zu, Qiaohong (ed.) et al., Pervasive computing and the networked world. Joint international conference, ICPCA/SWS 2013, Vina del Mar, Chile, December 5‒7, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-319-09264-5/pbk). Lecture Notes in Computer Science 8351, 143-149 (2014).
WorldCat.org
30
Efficient leakage-resilient signature schemes in the generic bilinear group model. (English)
Huang, Xinyi (ed.) et al., Information security practice and experience. 10th international conference, ISPEC 2014, Fuzhou, China, May 5‒8, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-06319-5/pbk). Lecture Notes in Computer Science 8434, 418-432 (2014).
WorldCat.org
31
A user-centric digital signature scheme. (English)
Katsikas, Sokratis (ed.) et al., Public key infrastructures, services and applications. 10th European workshop, EuroPKI 2013, Egham, UK, September 12‒13, 2013. Revised selected papers. Berlin: Springer (ISBN 978-3-642-53996-1/pbk). Lecture Notes in Computer Science 8341, 152-169 (2014).
WorldCat.org
32
Image retrieval based on binary signature and S-$k$Graph. (English)
Ann. Univ. Sci. Budap. Rolando Eötvös, Sect. Comput. 43, 105-122 (2014).
WorldCat.org
33
Group signature protocol based on masking public keys. (English)
Quasigroups Relat. Syst. 22, No. 1, 133-140 (2014).
WorldCat.org
34
Cryptography in constant parallel time. (English)
Information Security and Cryptography. Berlin: Springer (ISBN 978-3-642-17366-0/hbk; 978-3-642-17367-7/ebook). xvi, 193~p. (2014).
WorldCat.org
35
Fail-stop designated recipient signature scheme based on elliptic curve discrete logarithm problem. (English)
Ital. J. Pure Appl. Math. 31, 205-218, electronic only (2013).
WorldCat.org
36
A practical leakage-resilient signature scheme in the generic group model. (English)
Knudsen, Lars R. (ed.) et al., Selected areas in cryptography. 19th international conference, SAC 2012, Windsor, Canada, August 15‒16, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-35998-9/pbk; 978-3-642-35999-6/ebook). Lecture Notes in Computer Science 7707, 50-65 (2013).
WorldCat.org
37
Cryptoschemes based on difficulty of simultaneous solving two different difficult problems. (English)
Comput. Sci. J. Mold. 21, No. 2, 280-290 (2013).
WorldCat.org
38
Two proposals for group signature schemes based on number theory problems. (English)
Log. J. IGPL 21, No. 4, 648-658 (2013).
WorldCat.org
39
Short signatures from the difficulty of factoring problem. (English)
Bul. Acad. Ştiinţe Repub. Mold., Mat. 2013, No. 2(72)-3(73), 27-36 (2013).
WorldCat.org
40

Result 21 to 40 from 523 total

Valid XHTML 1.0 Transitional Valid CSS!