Efficient Platform for Traceable Collaborative Workflow Based on Digital Signature with Bi-Trapdoor Hash Function
暂无分享,去创建一个
[1] Mark J. Clement,et al. Performance of finite field arithmetic in an elliptic curve cryptosystem , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[2] Mihir Bellare,et al. The Security of Practical Two-Party RSA Signature Schemes , 2001, IACR Cryptol. ePrint Arch..
[3] Haibin Zhu,et al. Some issues of role-based collaboration , 2003, CCECE 2003 - Canadian Conference on Electrical and Computer Engineering. Toward a Caring and Humane Technology (Cat. No.03CH37436).
[4] Claus-Peter Schnorr,et al. Efficient Identification and Signatures for Smart Cards (Abstract) , 1990, EUROCRYPT.
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] Seng-Phil Hong,et al. Access control in collaborative systems , 2005, CSUR.
[7] Kwangjo Kim,et al. Discrete logarithm based chameleon hashing and signatures without key exposure , 2011, Comput. Electr. Eng..
[8] Kaisa Nyberg,et al. Fast Accumulated Hashing , 1996, FSE.
[9] K. Lauter,et al. The advantages of elliptic curve cryptography for wireless security , 2004, IEEE Wireless Communications.
[10] Marc Joye,et al. An Efficient On-Line/Off-Line Signature Scheme without Random Oracles , 2008, CANS.
[11] Anas Abou El Kalam,et al. Access Control for Collaborative Systems: A Web Services Based Approach , 2007, IEEE International Conference on Web Services (ICWS 2007).
[12] Aniket Kittur,et al. He says, she says: conflict and coordination in Wikipedia , 2007, CHI.
[13] Mukesh Singhal,et al. Efficient proxy signatures based on trapdoor hash functions , 2010, IET Inf. Secur..
[14] Yael Tauman Kalai,et al. Improved Online/Offline Signature Schemes , 2001, CRYPTO.
[15] Giuseppe Ateniese,et al. On the Key Exposure Problem in Chameleon Hashes , 2004, SCN.