Non-interactive Deniable Authentication Protocols
暂无分享,去创建一个
[1] Wei-Min Shi. ID-Based Non-interactive Deniable Authentication Protocol , 2009, 2009 Fifth International Conference on Information Assurance and Security.
[2] Zhenfu Cao,et al. Efficient non-interactive deniable authentication protocols , 2005, The Fifth International Conference on Computer and Information Technology (CIT'05).
[3] Tao Wu,et al. An Efficient Deniable Authentication Protocol , 2009, 2009 International Conference on Management and Service Science.
[4] Yi Mu,et al. Non-interactive Deniable Ring Authentication , 2003, ICISC.
[5] Xin Xiangjun,et al. A Secure and Efficient Deniable Authentication Protocol , 2009, 2009 WASE International Conference on Information Engineering.
[6] Xiangjun Xin,et al. ID-Based Non-Interactive Deniable Authentication Protocol from Pairings , 2009, 2009 International Conference on E-Business and Information System Security.
[7] Rosario Gennaro,et al. New Approaches for Deniable Authentication , 2005, CCS '05.
[8] Zhenfu Cao,et al. Non-interactive deniable authentication protocol based on factoring , 2005, Comput. Stand. Interfaces.
[9] Yalin Chen,et al. A ID-Based Deniable Authentication Protocol on pairings , 2006, IACR Cryptol. ePrint Arch..
[10] Li Wei,et al. An Enhanced Deniable Authentication Protocol , 2008 .
[11] Jongin Lim,et al. Information Security and Cryptology - ICISC 2003 , 2003, Lecture Notes in Computer Science.
[12] Moni Naor,et al. Concurrent zero-knowledge , 2004, JACM.
[13] Jianhua Li,et al. Identity-based deniable authentication protocol , 2005 .
[14] Daniel R. L. Brown. Deniable Authentication with RSA and Multicasting , 2005, IACR Cryptol. ePrint Arch..
[15] Mihir Bellare,et al. Multi-signatures in the plain public-Key model and a general forking lemma , 2006, CCS '06.
[16] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[17] Zhenfu Cao,et al. A New ID-Based Deniable Authentication Protocol , 2007, Informatica.
[18] Fagen Li,et al. An Identity-Based Restricted Deniable Authentication Protocol , 2009, 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications.
[19] Chin-Chen Chang,et al. An efficient deniable authentication protocol , 2005, 2005 International Conference on Cyberworlds (CW'05).
[20] Zhenfu Cao,et al. A new deniable authentication protocol from bilinear pairings , 2005, Appl. Math. Comput..
[21] Wei-Bin Lee,et al. A novel deniable authentication protocol using generalized ElGamal signature scheme , 2007, Inf. Sci..
[22] Nikita Borisov,et al. Off-the-record communication, or, why not to use PGP , 2004, WPES '04.
[23] Bo Meng,et al. A Secure Non-Interactive Deniable Authentication Protocol with Strong Deniability Based on Discrete Logarithm Problem and its Application on Internet Voting Protocol , 2009 .
[24] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[25] Bin Wang,et al. A non-interactive deniable authentication scheme based on designated verifier proofs , 2009, Inf. Sci..
[26] Zuhua Shao. Efficient deniable authentication protocol based on generalized ElGamal signature scheme , 2004, Comput. Stand. Interfaces.
[27] Colin Boyd,et al. Advances in Cryptology - ASIACRYPT 2001 , 2001 .