Improved Signcryption Scheme with Public Verifiability
暂无分享,去创建一个
[1] Ping Wei,et al. Anonymous Proxy Authorization Signature Scheme with Forward Security , 2008, 2008 International Conference on Computer Science and Software Engineering.
[2] Rahim Tafazolli,et al. Genetically modified multiuser detection for code division multiple access systems , 2002, IEEE J. Sel. Areas Commun..
[3] Ping Wei,et al. Key management scheme based on (t, n) threshold cryptosystem , 2008, 2008 3rd International Conference on Intelligent System and Knowledge Engineering.
[4] Ueli Maurer,et al. General Secure Multi-party Computation from any Linear Secret-Sharing Scheme , 2000, EUROCRYPT.
[5] Jianhong Zhang,et al. A Novel Efficient Group Signature Scheme with Forward Security , 2003, ICICS.
[6] Ramesh Annavajjala,et al. BER-Optimal Linear Parallel Interference Cancellation for Multicarrier DS-CDMA in Rayleigh Fading , 2007, IEEE Transactions on Communications.
[7] Rainer A. Rueppel,et al. Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem , 1994, EUROCRYPT.
[8] Xiaoyuan Yang,et al. BSADF: Blind Signature Based Anonymous Digital Fingerprint , 2007, Fourth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2007).
[9] Yuliang Zheng,et al. Signcryption and Its Applications in Efficient Public Key Solutions , 1997, ISW.
[10] David W. Matolak,et al. Efficient statistical parallel interference cancellation for DS-CDMA in Rayleigh fading channels , 2007, IEEE Transactions on Wireless Communications.
[11] Kyung-Ah Shim,et al. New DSA-Verifiable Signcryption Schemes , 2002, ICISC.
[12] Xiaoyuan Yang,et al. Threshold Cryptosystem and Its Application in Key Management Scheme , 2008, 2008 International Symposium on Knowledge Acquisition and Modeling.
[13] Changshe Ma,et al. Publicly verifiable authenticated encryption , 2003 .
[14] Ping Wei,et al. Proxy Authorization Signature with Conditional Anonymity and Its Application , 2008, 2008 International Symposium on Knowledge Acquisition and Modeling.
[15] Mitsuo Gen,et al. Effective genetic approach for optimizing advanced planning and scheduling in flexible manufacturing system , 2006, GECCO.
[16] Yuanan Liu,et al. Generalized Parallel Interference Cancellation With Near-Optimal Detection Performance , 2008, IEEE Transactions on Signal Processing.
[17] Zhang Wei. Key Management Scheme for Network Environment Based on Elliptic Curves Cryptosystem , 2004 .
[18] Min-Shiang Hwang,et al. A threshold signature scheme for group communications without a shared distribution center , 2004, Future Gener. Comput. Syst..
[19] Moti Yung,et al. Perfectly Secure Key Distribution for Dynamic Conferences , 1992, Inf. Comput..