-
1
-
-
84957619091
-
Authentication enhanced security and error correcting codes
-
Advances in Cryptology-Proceedings of Crypto'98, Springer-Verlag
-
Aumann Y., and Rabin M. Authentication enhanced security and error correcting codes. Advances in Cryptology-Proceedings of Crypto'98. Lecture Notes in Computer Sciences 1462 (1998), Springer-Verlag 299-303
-
(1998)
Lecture Notes in Computer Sciences
, vol.1462
, pp. 299-303
-
-
Aumann, Y.1
Rabin, M.2
-
2
-
-
33845916804
-
-
Y. Aumann, M. Rabin, "Efficient deniable authentication of long messages," in International Conference on Theoretical Computer Science in Honor of Professor Manuel Blum's 60th birthday, 1998. .
-
-
-
-
4
-
-
0031632567
-
-
C. Dwork, M. Naor, A. Sahai, Concurrent zero-knowledge, in: Proceedings of 30th ACM STOC'98, 1998, pp. 409-418.
-
-
-
-
5
-
-
0037019232
-
Deniable authentication protocol based on Diffie-Hellman algorithm
-
Fan L., Xu C.X., and Li J.H. Deniable authentication protocol based on Diffie-Hellman algorithm. Electronics Letters 38 4 (2002) 705-706
-
(2002)
Electronics Letters
, vol.38
, Issue.4
, pp. 705-706
-
-
Fan, L.1
Xu, C.X.2
Li, J.H.3
-
6
-
-
11344286621
-
Multi-view face identification and pose estimation using B-spline interpolation
-
Frank S., Camel F., and Kai Z. Multi-view face identification and pose estimation using B-spline interpolation. Information Sciences 169 3-4 (2005) 189-204
-
(2005)
Information Sciences
, vol.169
, Issue.3-4
, pp. 189-204
-
-
Frank, S.1
Camel, F.2
Kai, Z.3
-
7
-
-
0028547435
-
Design of generalized ElGamal type digital signature schemes based on discrete logarithm
-
Harn L., and Xu Y. Design of generalized ElGamal type digital signature schemes based on discrete logarithm. Electronics Letters 30 24 (2004) 2025-2026
-
(2004)
Electronics Letters
, vol.30
, Issue.24
, pp. 2025-2026
-
-
Harn, L.1
Xu, Y.2
-
8
-
-
33845949530
-
-
National Institute of Standards and Technology (NIST), "Digital signature standard," FIPS PUB 186, 1994, p. 20.
-
-
-
-
9
-
-
26044448602
-
A new deniable authentication protocol from bilinear pairings
-
Lu R., and Cao Z. A new deniable authentication protocol from bilinear pairings. Applied Mathematics and Computation 168 2 (2005) 954-961
-
(2005)
Applied Mathematics and Computation
, vol.168
, Issue.2
, pp. 954-961
-
-
Lu, R.1
Cao, Z.2
-
10
-
-
14844309431
-
Non-interactive deniable authentication protocol based on factoring
-
Lu R., and Cao Z. Non-interactive deniable authentication protocol based on factoring. Computer Standards & Interfaces 27 4 (2005) 401-405
-
(2005)
Computer Standards & Interfaces
, vol.27
, Issue.4
, pp. 401-405
-
-
Lu, R.1
Cao, Z.2
-
11
-
-
12344258539
-
Efficient signature generation by smart cards
-
Schnorr C.P. Efficient signature generation by smart cards. Journal of Cryptology 4 3 (1991) 161-174
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
12
-
-
2342455866
-
Efficient deniable authentication protocol based on generalized ElGamal signature scheme
-
Shao Z. Efficient deniable authentication protocol based on generalized ElGamal signature scheme. Computer Standards & Interfaces 26 5 (2004) 449-454
-
(2004)
Computer Standards & Interfaces
, vol.26
, Issue.5
, pp. 449-454
-
-
Shao, Z.1
-
13
-
-
0242523780
-
Nonlinear system identification using discrete-time recurrent neural networks with stable learning algorithms
-
Wen Y. Nonlinear system identification using discrete-time recurrent neural networks with stable learning algorithms. Information Sciences 158 (2004) 131-147
-
(2004)
Information Sciences
, vol.158
, pp. 131-147
-
-
Wen, Y.1
-
14
-
-
0036849810
-
Dynamic system identification via recurrent multilayer perceptrons
-
Xiaoou L., and Wen Y. Dynamic system identification via recurrent multilayer perceptrons. Information Sciences 147 1-4 (2002) 45-63
-
(2002)
Information Sciences
, vol.147
, Issue.1-4
, pp. 45-63
-
-
Xiaoou, L.1
Wen, Y.2
|