-
1
-
-
33845726678
-
Securing vehicular ad hoc networks
-
M. Raya and J-P. Hubaux, "Securing Vehicular Ad Hoc Networks," J. Computer Security, special issue on security of ad hoc and sensor networks, vol. 15, no. 1, pp. 39-68, 2007. (Pubitemid 46012642)
-
(2007)
Journal of Computer Security
, vol.15
, Issue.1
, pp. 39-68
-
-
Raya, M.1
Hubaux, J.-P.2
-
2
-
-
0002681959
-
Untraceable off-line cash in wallets with observers
-
S. Brands, "Untraceable Off-Line Cash in Wallets with Observers," Proc. CRYPTO '93, pp. 302-318, 1993.
-
(1993)
Proc. CRYPTO '93
, pp. 302-318
-
-
Brands, S.1
-
3
-
-
33947644846
-
Whopay: A scalable and anonymous payment system for peer-to-peer environments
-
K. Wei, Y.R. Chen, A.J. Smith, and B. Vo, "Whopay: A Scalable and Anonymous Payment System for Peer-to-Peer Environments," Proc. IEEE Intl'l Conf. Distributed Computing Systems, 2006.
-
(2006)
Proc. IEEE Intl'l Conf. Distributed Computing Systems
-
-
Wei, K.1
Chen, Y.R.2
Smith, A.J.3
Vo, B.4
-
4
-
-
51349100827
-
A security architecture achieving anonymity and traceability in wireless mesh networks
-
J. Sun, C. Zhang, and Y. Fang, "A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks," Proc. IEEE Conf. Computer Comm., pp. 1687-1695, 2008.
-
(2008)
Proc. IEEE Conf. Computer Comm.
, pp. 1687-1695
-
-
Sun, J.1
Zhang, C.2
Fang, Y.3
-
5
-
-
78751651500
-
SAT: A security architecture achieving anonymity and traceability in wireless mesh networks
-
J. Sun, C. Zhang, Y. Zhang, and Y. Fang, "SAT: A Security Architecture Achieving Anonymity and Traceability in Wireless Mesh Networks," IEEE Trans. Dependable and Secure Computing, vol. 8, no. 2, pp. 295-307, 2011.
-
(2011)
IEEE Trans. Dependable and Secure Computing
, vol.8
, Issue.2
, pp. 295-307
-
-
Sun, J.1
Zhang, C.2
Zhang, Y.3
Fang, Y.4
-
6
-
-
33750051030
-
Efficient provably secure restrictive partially blind signatures from bilinear pairings
-
4107 LNCS, Financial Cryptography and Data Security - 10th International Conference, FC 2006, Revised Selected Papers
-
X. Chen, F. Zhang, Y. Mu, and W. Susilo, "Efficient Provably Secure Restrictive Partially Blind Signatures from Bilinear Pairings," Proc. Financial Cryptography 2006, pp. 251-265, 2006. (Pubitemid 44577294)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 251-265
-
-
Chen, X.1
Zhang, F.2
Mu, Y.3
Susilo, W.4
-
7
-
-
33846050393
-
ID-based restrictive partially blind signatures and applications
-
DOI 10.1016/j.jss.2006.02.046, PII S0164121206000719
-
X. Chen, F. Zhang, and S. Liu, "ID-Based Restrictive Partially Blind Signatures and Applications," J. Systems and Software, vol. 80, no. 2, pp. 164-171, 2007. (Pubitemid 46074166)
-
(2007)
Journal of Systems and Software
, vol.80
, Issue.2
, pp. 164-171
-
-
Chen, X.1
Zhang, F.2
Liu, S.3
-
8
-
-
52049103125
-
Analysis of id-based restrictive partially blind signatures and applications
-
X. Hu and S. Huang, "Analysis of ID-Based Restrictive Partially Blind Signatures and Applications," J. Systems and Software, vol. 81, no. 11, pp. 1951-1954, 2008.
-
(2008)
J. Systems and Software
, vol.81
, Issue.11
, pp. 1951-1954
-
-
Hu, X.1
Huang, S.2
-
9
-
-
33751529199
-
Securing mobile ad hoc networks with certificateless public keys
-
DOI 10.1109/TDSC.2006.58
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "Securing Mobile Ad Hoc Networks with Certificateless Public Keys," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 4, pp. 386-399, Oct. 2006. (Pubitemid 44837040)
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 386-399
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
|