共 49 条
- [41] How to Construct State Registries-Matching Undeniability with Public Security INTELLIGENT INFORMATION AND DATABASE SYSTEMS, PT I, PROCEEDINGS, 2010, 5990 : 64 - +
- [43] How to generate universally verifiable signatures in ad-hoc networks SECURE MOBILE AD-HOC NETWORKS AND SENSORS, 2006, 4074 : 118 - 131
- [45] Forward-Secure Signatures for Unbounded Time Periods in Mobile Computing Applications INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2007, 7 (05): : 208 - 212
- [46] EVEREST: An efficient method for verification of digital signatures in real-time teleradiology MEDINFO 2004: PROCEEDINGS OF THE 11TH WORLD CONGRESS ON MEDICAL INFORMATICS, PT 1 AND 2, 2004, 107 : 1241 - 1245
- [47] HMAC BASED ONE TIME PASSWORD GENERATOR 2014 22ND SIGNAL PROCESSING AND COMMUNICATIONS APPLICATIONS CONFERENCE (SIU), 2014, : 1563 - 1566
- [48] Sandwich is indeed secure: How to authenticate a message with just one hashing Information Security and Privacy, Proceedings, 2007, 4586 : 355 - 369
- [49] Zero Knowledge One Time Digital Signature Scheme 2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 479 - 482