-
1
-
-
84906498074
-
-
Kwik Survey: KwikSurveys: Offical Free online survey and questionnaire tool
-
Kwik Survey: KwikSurveys: Offical Free online survey and questionnaire tool, http://www.kwiksurveys.com/
-
-
-
-
2
-
-
84906488670
-
-
My3q: FREE Online Survey Questionnaire Research by my3q
-
My3q: FREE Online Survey Questionnaire Research by my3q, http://www.my3q.com/
-
-
-
-
3
-
-
84906507766
-
-
SurveyMonkey: SurveyMonkey: Free online survey software and questionnaire tool
-
SurveyMonkey: SurveyMonkey: Free online survey software and questionnaire tool, http://www.surveymonkey.com/
-
-
-
-
4
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
In: Blakely, G.R., Chaum, D. (eds.) Springer, Heidelberg
-
Shamir, A.: Identity-Based Cryptosystems and Signature Schemes. In: Blakely, G.R., Chaum, D. (eds.) Advances in Cryptology-CRYPTO 1984. LNCS, vol. 196, pp. 47-53. Springer, Heidelberg (1985)
-
(1985)
Advances in Cryptology-CRYPTO 1984. LNCS
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
5
-
-
84946833891
-
How to Leak a Secret
-
In: Boyd, C. (ed.) Springer, Heidelberg
-
Rivest, R.L., Shamir, A., Tauman, Y.: How to Leak a Secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552-565. Springer, Heidelberg (2001)
-
(2001)
Asiacrypt 2001. LNCS
, vol.2248
, pp. 552-565
-
-
Rivest, R.L.1
Shamir, A.2
Tauman, Y.3
-
6
-
-
38049115330
-
Mesh signatures
-
In: Naor, M. (ed.) Springer, Heidelberg
-
Boyen, X.: Mesh Signatures. In: Naor, M. (ed.) EUROCRYPT 2007. LNCS, vol. 4515, pp. 210-227. Springer, Heidelberg (2007)
-
(2007)
Eurocrypt 2007. LNCS
, vol.4515
, pp. 210-227
-
-
Boyen, X.1
-
7
-
-
85024290278
-
Group signatures
-
In: Davies, D.W. (ed.) Springer, Heidelberg
-
Chaum, D., van Heyst, E.: Group Signatures. In: Davies, D.W. (ed.) Advances in Cryptology-EUROCRYPT 1991. LNCS, vol. 547, pp. 257-265. Springer, Heidelberg (1991)
-
(1991)
Advances in Cryptology-EUROCRYPT 1991. LNCS
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
8
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
In: Bellare, M. (ed.) Springer, Heidelberg
-
Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 255-270. Springer, Heidelberg (2000)
-
(2000)
CRYPTO 2000. LNCS
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
9
-
-
70350676690
-
Threshold attribute-based signatures and their application to anonymous credential systems
-
In: Preneel, B. (ed.) Springer, Heidelberg
-
Shahandashti, S.F., Safavi-Naini, R.: Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 198-216. Springer, Heidelberg (2009)
-
(2009)
AFRICACRYPT 2009. LNCS
, vol.5580
, pp. 198-216
-
-
Shahandashti, S.F.1
Safavi-Naini, R.2
-
10
-
-
77954473455
-
Attribute-based signature and its applications
-
In: Feng, D., Basin, D.A., Liu, P. (eds.). ACM
-
Li, J., Au, M.H., Susilo, W., Xie, D., Ren, K.: Attribute-Based Signature and Its Applications. In: Feng, D., Basin, D.A., Liu, P. (eds.) ASIACCS, pp. 60-69. ACM (2010)
-
(2010)
ASIACCS
, pp. 60-69
-
-
Li, J.1
Au, M.H.2
Susilo, W.3
Xie, D.4
Ren, K.5
-
11
-
-
79951783454
-
Attribute-based signatures
-
In: Kiayias, A. (ed.) Springer, Heidelberg
-
Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-Based Signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 376-392. Springer, Heidelberg (2011)
-
(2011)
CT-RSA 2011. LNCS
, vol.6558
, pp. 376-392
-
-
Maji, H.K.1
Prabhakaran, M.2
Rosulek, M.3
-
12
-
-
79952521355
-
Efficient attribute-based signatures for non-monotone predicates in the standard model
-
In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) Springer, Heidelberg
-
Okamoto, T., Takashima, K.: Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 35-52. Springer, Heidelberg (2011)
-
(2011)
PKC 2011. LNCS
, vol.6571
, pp. 35-52
-
-
Okamoto, T.1
Takashima, K.2
-
13
-
-
84956974327
-
Receipt-free electronic voting schemes for large scale elections
-
In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds.) Springer, Heidelberg
-
Okamoto, T.: Receipt-Free Electronic Voting Schemes for Large Scale Elections. In: Christianson, B., Crispo, B., Lomas, M., Roe, M. (eds.) Security Protocols 1997. LNCS, vol. 1361, pp. 25-35. Springer, Heidelberg (1998)
-
(1998)
Security Protocols 1997. LNCS
, vol.1361
, pp. 25-35
-
-
Okamoto, T.1
-
14
-
-
33749009810
-
Coercion-resistant electronic elections
-
ACM Press
-
Juels, A., Catalano, D., Jakobsson, M.: Coercion-resistant electronic elections. In: WPES 2005, pp. 61-70. ACM Press (2005)
-
(2005)
WPES 2005
, pp. 61-70
-
-
Juels, A.1
Catalano, D.2
Jakobsson, M.3
-
15
-
-
80051981601
-
Optimal structure-preserving signatures in asymmetric bilinear groups
-
In: Rogaway, P. (ed.) Springer, Heidelberg
-
Abe, M., Groth, J., Haralambiev, K., Ohkubo, M.: Optimal Structure-Preserving Signatures in Asymmetric Bilinear Groups. In: Rogaway, P. (ed.) CRYPTO 2011. LNCS, vol. 6841, pp. 649-666. Springer, Heidelberg (2011)
-
(2011)
CRYPTO 2011. LNCS
, vol.6841
, pp. 649-666
-
-
Abe, M.1
Groth, J.2
Haralambiev, K.3
Ohkubo, M.4
-
17
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 24(2), 84-88 (1981)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
18
-
-
0001292443
-
A practical secret voting scheme for large scale election
-
In: Zheng, Y., Seberry, J. (eds.) Springer, Heidelberg
-
Fujioka, A., Okamoto, T., Ohta, K.: A Practical Secret Voting Scheme for Large Scale Election. In: Zheng, Y., Seberry, J. (eds.) AUSCRYPT 1992. LNCS, vol. 718, pp. 244-260. Springer, Heidelberg (1993)
-
(1993)
AUSCRYPT 1992. LNCS
, vol.718
, pp. 244-260
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
20
-
-
84948969982
-
Efficient receipt-free voting based on homomorphic encryption
-
In: Preneel, B. (ed.) Springer, Heidelberg
-
Hirt, M., Sako, K.: Efficient Receipt-Free Voting Based on Homomorphic Encryption. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 539-556. Springer, Heidelberg (2000)
-
(2000)
Eurocrypt 2000. LNCS
, vol.1807
, pp. 539-556
-
-
Hirt, M.1
Sako, K.2
-
21
-
-
35248822599
-
A verifiable secret shuffle of homomorphic encryptions
-
In: Desmedt, Y.G. (ed.) Springer, Heidelberg
-
Groth, J.: A Verifiable Secret Shuffle of Homomorphic Encryptions. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 145-160. Springer, Heidelberg (2002)
-
(2002)
PKC 2003. LNCS
, vol.2567
, pp. 145-160
-
-
Groth, J.1
-
22
-
-
24644455351
-
A restricted multi-show credential system and its application on e-voting
-
In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds.) Springer, Heidelberg
-
Liu, J.K., Wong, D.S.: A Restricted Multi-show Credential System and its Application on E-Voting. In: Deng, R.H., Bao, F., Pang, H., Zhou, J. (eds.) ISPEC 2005. LNCS, vol. 3439, pp. 268-279. Springer, Heidelberg (2005)
-
(2005)
ISPEC 2005. LNCS
, vol.3439
, pp. 268-279
-
-
Liu, J.K.1
Wong, D.S.2
-
23
-
-
35048825874
-
Linkable spontaneous anonymous group signature for ad hoc groups (extended abstract)
-
In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) Springer, Heidelberg
-
Liu, J.K., Wei, V.K., Wong, D.S.: Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract). In: Wang, H., Pieprzyk, J., Varadharajan, V. (eds.) ACISP 2004. LNCS, vol. 3108, pp. 325-335. Springer, Heidelberg (2004)
-
(2004)
ACISP 2004. LNCS
, vol.3108
, pp. 325-335
-
-
Liu, J.K.1
Wei, V.K.2
Wong, D.S.3
-
24
-
-
33845535348
-
Enhanced security models and a generic construction approach for linkable ring signature
-
Liu, J.K., Wong, D.S.: Enhanced security models and a generic construction approach for linkable ring signature. Int. J. Found. Comput. Sci. 17(6), 1403-1422 (2006)
-
(2006)
Int. J. Found. Comput. Sci.
, vol.17
, Issue.6
, pp. 1403-1422
-
-
Liu, J.K.1
Wong, D.S.2
-
25
-
-
37148998536
-
Certificate based (linkable) ring signature
-
In: Dawson, E., Wong, D.S. (eds.) Springer, Heidelberg
-
Au, M.H., Liu, J.K., Susilo, W., Yuen, T.H.: Certificate based (linkable) ring signature. In: Dawson, E., Wong, D.S. (eds.) ISPEC 2007. LNCS, vol. 4464, pp. 79-92. Springer, Heidelberg (2007)
-
(2007)
ISPEC 2007. LNCS
, vol.4464
, pp. 79-92
-
-
Au, M.H.1
Liu, J.K.2
Susilo, W.3
Yuen, T.H.4
-
26
-
-
85151064862
-
Robust receipt-free election system with ballot secrecy and verifiability
-
Chow, S.S.M., Liu, J.K., Wong, D.S.: Robust Receipt-Free Election System with Ballot Secrecy and Verifiability. In: NDSS. The Internet Society (2008)
-
(2008)
NDSS. The Internet Society
-
-
Chow, S.S.M.1
Liu, J.K.2
Wong, D.S.3
-
27
-
-
84875690586
-
Efficient linkable and/or threshold ring signature without random oracles
-
Yuen, T.H., Liu, J.K., Au, M.H., Susilo, W., Zhou, J.: Efficient linkable and/or threshold ring signature without random oracles. Comput. J. 56(4), 407-421 (2013)
-
(2013)
Comput. J.
, vol.56
, Issue.4
, pp. 407-421
-
-
Yuen, T.H.1
Liu, J.K.2
Au, M.H.3
Susilo, W.4
Zhou, J.5
-
28
-
-
84871816306
-
Secure id-based linkable and revocableiff-linked ring signature with constant-size construction
-
Au,M.H., Liu, J.K., Susilo,W., Yuen, T.H.: Secure id-based linkable and revocableiff-linked ring signature with constant-size construction. Theor. Comput. Sci. 469, 1-14 (2013)
-
(2013)
Theor. Comput. Sci.
, vol.469
, pp. 1-14
-
-
Au, M.H.1
Liu, J.K.2
Susilo, W.3
Yuen, T.H.4
-
29
-
-
84890338882
-
Linkable ring signature with unconditional anonymity
-
Liu, J.K., Au, M.H., Susilo, W., Zhou, J.: Linkable ring signature with unconditional anonymity. IEEE Trans. Knowl. Data Eng. 26(1), 157-165 (2014)
-
(2014)
IEEE Trans. Knowl. Data Eng.
, vol.26
, Issue.1
, pp. 157-165
-
-
Liu, J.K.1
Au, M.H.2
Susilo, W.3
Zhou, J.4
-
30
-
-
84906516858
-
-
of Standards, N.I., Technology: NIST IR 7628: Guidelines for Smart Grid Cyber Security. Technical report
-
of Standards, N.I., Technology: NIST IR 7628: Guidelines for Smart Grid Cyber Security. Technical report (2010), http://csrc.nist.gov/publications/ PubsNISTIRs.html
-
(2010)
-
-
-
31
-
-
79951969637
-
Threshold anonymous announcement in vanets
-
Chen, L., Ng, S.L., Wang, G.: Threshold Anonymous Announcement in VANETs. IEEE Journal on Selected Areas in Communications 29(3), 605-615 (2011)
-
(2011)
IEEE Journal on Selected Areas in Communications
, vol.29
, Issue.3
, pp. 605-615
-
-
Chen, L.1
Ng, S.L.2
Wang, G.3
|