A traceable threshold signature scheme with multiple signing policies (English)
- New search for: Shao, Jun
- New search for: Cao, Zhenfu
- New search for: Shao, Jun
- New search for: Cao, Zhenfu
In:
Computers and Security
;
25
, 3
;
201-206
;
2005
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:A traceable threshold signature scheme with multiple signing policies
-
Contributors:Shao, Jun ( author ) / Cao, Zhenfu ( author )
-
Published in:Computers and Security ; 25, 3 ; 201-206
-
Publisher:
- New search for: Elsevier Ltd
-
Publication date:2005-11-15
-
Size:6 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 25, Issue 3
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 155
-
Special systems: Overlooked sources of security risk?Ph.D., CISSP, CISM Schultz, E. Eugene et al. | 2006
- 156
-
Security Views - Malware Update| 2006
- 163
-
Modeling network securityBradbury, Danny et al. | 2006
- 165
-
Information Security – The Fourth Wavevon Solms, Basie et al. | 2006
- 169
-
Real-time analysis of intrusion detection alerts via correlationLee, Soojin / Chung, Byungchun / Kim, Heeyoul / Lee, Yunho / Park, Chanil / Yoon, Hyunsoo et al. | 2005
- 184
-
A novel remote user authentication scheme using bilinear pairingsDas, Manik Lal / Saxena, Ashutosh / Gulati, Ved P. / Phatak, Deepak B. et al. | 2005
- 190
-
A novel approach for computer security education using Minix instructional operating systemDu, Wenliang / Shang, Mingdong / Xu, Haizhi et al. | 2005
- 201
-
A traceable threshold signature scheme with multiple signing policiesShao, Jun / Cao, Zhenfu et al. | 2005
- 207
-
Security implications in RFID and authentication processing frameworkAyoade, John et al. | 2005
- 213
-
Change trend of averaged Hurst parameter of traffic under DDOS flood attacksLi, Ming et al. | 2005
- 221
-
An empirical examination of the reverse engineering process for binary filesSutherland, Iain / Kalb, George E. / Blyth, Andrew / Mulley, Gaius et al. | 2005
- 229
-
A simple, configurable SMTP anti-spam filter: GreylistsGonzález-Talaván, Guillermo et al. | 2006
- EX1
-
Calendar of events - update| 2006