Information and Communications Security
From MaRDI portal
Publication:5464806
DOI10.1007/b101042zbMath1109.68460OpenAlexW4206056219MaRDI QIDQ5464806
Publication date: 19 August 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b101042
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (8)
Certificateless ring signature based on RSA problem and DL problem ⋮ Unconditionally Anonymous Controllable ID-Based Ring Signatures ⋮ A new ring signature scheme with signer-admission property ⋮ A Provably Secure Ring Signature Scheme in Certificateless Cryptography ⋮ Identity-based ring signatures from RSA ⋮ Certificate-free \textit{ad hoc} anonymous authentication ⋮ Certificate-Based Generalized Ring Signcryption Scheme ⋮ Post-quantum ID-based ring signatures from symmetric-key primitives
This page was built for publication: Information and Communications Security