-
2
-
-
74549210063
-
Universal authentication protocols for anonymous wireless communications
-
Jan.
-
G. Yang, Q. Huang, D. S. Wong, and X. Deng, "Universal authentication protocols for anonymous wireless communications," IEEE Trans. Wireless Commun., vol. 9, no. 1, pp. 168-184, Jan. 2010.
-
(2010)
IEEE Trans. Wireless Commun
, vol.9
, Issue.1
, pp. 168-184
-
-
Yang, G.1
Huang, Q.2
Wong, D.S.3
Deng, X.4
-
3
-
-
79960556311
-
Generalized digital certificate for user authentication and key establishment for secure communications
-
July
-
L. Harn and J. Ren, "Generalized digital certificate for user authentication and key establishment for secure communications," IEEE Trans. Wireless Commun., vol. 10, no. 7, July 2011.
-
(2011)
IEEE Trans. Wireless Commun
, vol.10
, Issue.7
-
-
Harn, L.1
Ren, J.2
-
4
-
-
84946833891
-
How to leak a secret
-
Springer 2001
-
R. Rivest, A. Shamir, and Y. Tauman, "How to leak a secret," in Advances in Cryptology-ASIACRYPT, Lecture Notes in Computer Science, vol. 2248/2001. Springer, 2001.
-
(2001)
Advances in Cryptology-ASIACRYPT, Lecture Notes in Computer Science
, vol.2248
-
-
Rivest, R.1
Shamir, A.2
Tauman, Y.3
-
5
-
-
85024290278
-
Group signatures
-
D. Chaum and E. van Heyst, "Group signatures," in Advances in Cryptology-EUROCRYPT, Lecture Notes in Computer Science, vol. 547, pp. 257-265, 1991.
-
(1991)
Advances in Cryptology-EUROCRYPT, Lecture Notes in Computer Science
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
6
-
-
84957354154
-
Efficient and generalized group signatures
-
J. L. Camenisch, "Efficient and generalized group signatures," in Advances in Cryptology-EUROCRYPT, Lecture Notes in Computer Science, vol. 1233, pp. 465-479, 1997.
-
(1997)
Advances in Cryptology-EUROCRYPT, Lecture Notes in Computer Science
, vol.1233
, pp. 465-479
-
-
Camenisch, J.L.1
-
7
-
-
84958612917
-
Efficient group signature schemes for large groups
-
J. L. Camenisch and M. A. Stadler, "Efficient group signature schemes for large groups," in Advances in Cryptology-Crypto'97, Lecture Notes in Computer Science, vol. 1294, pp. 410-424, 1997.
-
(1997)
Advances in Cryptology-Crypto'97, Lecture Notes in Computer Science
, vol.1294
, pp. 410-424
-
-
Camenisch, J.L.1
Stadler, M.A.2
-
10
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
C. P. Schnorr, "Efficient identification and signatures for smart cards," in Advances in Cryptology-Crypto'89, Lecture Notes in Computer Science, vol. 435, pp. 239-252, 1989.
-
(1989)
Advances in Cryptology-Crypto'89, Lecture Notes in Computer Science
, vol.435
, pp. 239-252
-
-
Schnorr, C.P.1
-
11
-
-
84958744427
-
1-out-of-n signatures from a variety of keys
-
M. Abe, M. Ohkubo, and K. Suzuki, "1-out-of-n signatures from a variety of keys," in ASIACRYPT, Lecture Notes in Computer Science, vol. 2501, pp. 415-432, 2002.
-
(2002)
ASIACRYPT, Lecture Notes in Computer Science
, vol.2501
, pp. 415-432
-
-
Abe, M.1
Ohkubo, M.2
Suzuki, K.3
-
12
-
-
84937420077
-
Threshold ring signatures and applications to ad-hoc groups
-
E. Bresson, J. Stern, and M. Szydlo, "Threshold ring signatures and applications to ad-hoc groups," in Proc. 2002 Advances in Cryptology, Lecture Notes in Computer Science, vol. 2442, pp. 465-480, 2002.
-
(2002)
Proc. 2002 Advances in Cryptology, Lecture Notes in Computer Science
, vol.2442
, pp. 465-480
-
-
Bresson, E.1
Stern, J.2
Szydlo, M.3
-
13
-
-
0028508211
-
Group-oriented (t, n) threshold signature and multisignature
-
Sep
-
L. Harn, "Group-oriented (t, n) threshold signature and multisignature," IEE Proc.-Computers and Digital Techniques, vol. 141, no. 5, pp. 307-313, Sep. 1994.
-
(1994)
IEE Proc.-Computers and Digital Techniques
, vol.141
, Issue.5
, pp. 307-313
-
-
Harn, L.1
-
14
-
-
0347616995
-
On the arithmetic operational complexity for solving Vandermonde linear equations
-
Feb
-
L. Li, "On the arithmetic operational complexity for solving Vandermonde linear equations," Japan J. Industrial and Applied Mathematics, vol. 17, no. 1, pp. 15-18, Feb. 2000.
-
(2000)
Japan J. Industrial and Applied Mathematics
, vol.17
, Issue.1
, pp. 15-18
-
-
Li, L.1
-
15
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret," Commun. of the ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Commun. of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
16
-
-
51849154205
-
Comparing symmetric-key and public-key based security schemes in sensor networks a case study of user access control
-
H. Wang, S. Sheng, C. Tan, and Q. Li, "Comparing symmetric-key and public-key based security schemes in sensor networks a case study of user access control," in Proc. 2008 IEEE ICDCS, pp. 11-18.
-
Proc. 2008 IEEE ICDCS
, pp. 11-18
-
-
Wang, H.1
Sheng, S.2
Tan, C.3
Li, Q.4
-
18
-
-
0003089137
-
-
H. Handschuh and P. Paillier, "Smart card crypto-coprocessors for public-key cryptography," vol. 4, no. 1, pp. 6-10, 1998.
-
(1998)
Smart Card Crypto-coprocessors for Public-key Cryptography
, vol.4
, Issue.1
, pp. 6-10
-
-
Handschuh, H.1
Paillier, P.2
|