Implementing secure reporting of sexual misconduct -- revisiting WhoToo
From MaRDI portal
Publication:2146102
Recommendations
Cites work
- scientific article; zbMATH DE number 1617924 (Why is no real title available?)
- scientific article; zbMATH DE number 176545 (Why is no real title available?)
- scientific article; zbMATH DE number 2009983 (Why is no real title available?)
- A public key cryptosystem and a signature scheme based on discrete logarithms
- Advances in Cryptology – CRYPTO 2004
- Efficient signature generation by smart cards
- How To Prove Yourself: Practical Solutions to Identification and Signature Problems
- How to share a secret
- Practical Identity-Based Encryption Without Random Oracles
- Privacy-Preserving Set Operations
- Public Key Cryptography - PKC 2005
- Robust encryption
- Robust threshold DSS signatures
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Secure distributed key generation for discrete-log based cryptosystems
- Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
This page was built for publication: Implementing secure reporting of sexual misconduct -- revisiting WhoToo
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2146102)