Information Security and Cryptology - ICISC 2003
From MaRDI portal
Publication:5714150
DOI10.1007/b96249zbMath1092.94514MaRDI QIDQ5714150
Steve Kremer, Olivier Markowitch, Shahrokh Saeednia
Publication date: 27 December 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b96249
94A60: Cryptography
Related Items
How to achieve non-repudiation of origin with privacy protection in cloud computing, An ID-based multi-signer universal designated multi-verifier signature scheme, A short non-delegatable strong designated verifier signature, Designated verifier proxy signature scheme without random oracles, A novel ID-based designated verifier signature scheme