A BATCH VERIFYING AND DETECTING THE ILLEGAL SIGNATURES
暂无分享,去创建一个
Chun-Ta Li | 黃明祥 | Hwang | S. M. Chen
[1] Min-Shiang Hwang,et al. AN ONLINE BIOMETRICS-BASED SECRET SHARING SCHEME FOR MULTIPARTY CRYPTOSYSTEM USING SMART CARDS , 2009 .
[2] Cheng-Chi Lee,et al. Research Issues and Challenges for Multiple Digital Signatures , 2005, Int. J. Netw. Secur..
[3] Chun-Ta Li,et al. Further improvement on a novel privacy preserving authentication and access control scheme for pervasive computing environments , 2008, Comput. Commun..
[4] Yen-Ping Chu,et al. An Efficient Sensor-to-Sensor Authenticated Path-Key Establishment Scheme for Secure Communications in Wireless Sensor Networks , 2009 .
[5] Tony Thomas,et al. A Zero-knowledge Undeniable Signature Scheme in Non-abelian Group Setting , 2008, Int. J. Netw. Secur..
[6] Lein Harn,et al. Batch verifying multiple RSA digital signatures , 1998 .
[7] Chun-Ta Li,et al. An electronic voting protocol with deniable authentication for mobile ad hoc networks , 2008, Comput. Commun..
[8] Zhenfu Cao,et al. On Security of Two Nonrepudiable Threshold Multi-proxy Multi-signature Schemes with Shared Verification , 2007, Int. J. Netw. Secur..
[9] Eric Jui-Lin Lu,et al. Cryptanalysis of the Batch Verifying Multiple DSA-Type Digital Signature , 2001 .
[10] Fangguo Zhang,et al. A New Type of Designated Confirmer Signatures for a Group of Individuals , 2008, Int. J. Netw. Secur..
[11] Martin Stanek. Attacking LCCC Batch Verification of RSA Signatures , 2008, Int. J. Netw. Secur..
[12] Cheng-Chi Lee,et al. On the Security Enhancement of an Efficient and Secure Event Signature Protocol for P2P MMOGs , 2010, ICCSA.
[13] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[14] Chun-Ta Li,et al. Improving the security of a secure anonymous routing protocol with authenticated key exchange for ad hoc networks , 2008, Comput. Syst. Sci. Eng..
[15] Min-Shiang Hwang,et al. A NON-REPUDIABLE MULTI-PROXY MULTI-SIGNATURE SCHEME , 2009 .
[16] Maged Hamada Ibrahim. Resisting Traitors in Linkable Democratic Group Signatures , 2009, Int. J. Netw. Secur..
[17] Chun-Ta Li. An Efficient and Secure Communication Scheme for Trusted Computing Environments , 2009 .
[18] Chun-Ta Li,et al. A secure and efficient communication scheme with authenticated key establishment and privacy preserving for vehicular ad hoc networks , 2008, Comput. Commun..
[19] Chun-Ta Li,et al. An efficient biometrics-based remote user authentication scheme using smart cards , 2010, J. Netw. Comput. Appl..
[20] Chun-Ta Li,et al. Cryptanalysis of Threshold Password Authentication Against Guessing Attacks in Ad Hoc Networks , 2009, Int. J. Netw. Secur..
[21] Min-Shiang Hwang,et al. Cryptanalysis of the Batch Verifying Multiple RSA Digital Signatures , 2000, Informatica.
[22] L. Harn. Batch verifying multiple DSA-type digital signatures , 1998 .