Search alternatives:
signatures strong » signatures stronger, signatures strongly, signatures second
signature wrong » signature from, signature work, signature wound

1
by Joshi, Unmesh, Fowler, Martin
Published 2024
Addison-Wesley
...The Addison-Wesley signature series...

2
Published 2007
Springer Berlin Heidelberg
Table of Contents: ...Signatures -- Mutative Identity-Based Signatures or Dynamic Credentials Without Random Oracles -- A...

3
Published 2007
Springer Berlin Heidelberg
Table of Contents: ...Signature Schemes I -- Generic Transformation to Strongly Unforgeable Signatures -- Efficient...

4
Published 2023
Springer Nature Switzerland
Table of Contents: ... and Strong Context-Hiding -- Group Testing Aggregate Signatures with Soundness -- Attribute-Based Signatures...

5
Published 2003
Springer Berlin Heidelberg
Table of Contents: ... Generator Based on Hardness of Factoring -- Intrusion-Resilient Signatures: Generic Constructions...

6
Published 2021
Springer International Publishing
Table of Contents: ... on Hash-Based Signatures -- Analysis of a Strong Fault Attack on Static/Ephemeral CSIDH -- Simple Matrix...

7
Published 2006
Springer Berlin Heidelberg
Table of Contents: ... -- Identity-Based Strong Multi-Designated Verifiers Signatures...

8
by Applebaum, Benny
Published 2014
Springer Berlin Heidelberg
... attempts to construct cryptographic functions that achieve this strong notion of simplicity...

9
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Systems with Threshold Signature Schemes -- Context-Aware Usage Control for Android -- System Security...

10
Published 1993
Springer Berlin Heidelberg
Table of Contents: ... applications on the server-aided secret computation protocols -- Subliminal channels for signature transfer...

11
Published 2006
Vieweg+Teubner Verlag
Table of Contents: ... Applications: The Belgian Experience -- Electronic signature in Italy after ten years of “running...

12
by Halsey, Mike, Bettany, Andrew
Published 2015
Apress, Distributed to the Book trade worldwide by Springer+Business Media New York
Table of Contents: ...Restrict Remote UsersDriver Signature Enforcement; Restrict Physical Access; Anti-Malware: Location...

13
Published 1981
Springer Berlin Heidelberg
Table of Contents: ...-beta pruning algorithm -- Uniform complexity and digital signatures -- On the generation...

14
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... on Demand and Strong Privacy -- ?TSS – A Simplified Trusted Software Stack -- Requirements for an Integrity...

15
Published 2010
Springer Berlin Heidelberg
Table of Contents: ...2P -- Proxy Re-signature Scheme That Translates One Type of Signature Scheme to Another Type...

16
Published 1989
Springer Berlin Heidelberg
Table of Contents: ...On the power of parity polynomial time -- Complete problems and strong polynomial reducibilities...

17
Published 1993
Springer Berlin Heidelberg
Table of Contents: ... for Schnorr's hash function FFT-Hash presented at Crypto '91 -- On NIST's proposed digital signature standard...

18
Published 1991
Springer Berlin Heidelberg
Table of Contents: ...What's wrong with formal programming methods? -- Computer Science and communications protocols...

19
Published 2007
Springer Berlin Heidelberg
Table of Contents: ... -- On the Complexity of Unary Tiling-Recognizable Picture Languages -- Session 7A -- A Characterization of Strong...

20
Published 2010
Springer Berlin Heidelberg
Table of Contents: ... Generic Transformation to Strongly Unforgeable Signature in the Standard Model -- DR@FT: Efficient Remote...