11![An Efficient ID- based Directed Signature Scheme from Bilinear Pairings 1 B. Umaprasada Rao, An Efficient ID- based Directed Signature Scheme from Bilinear Pairings 1 B. Umaprasada Rao,](https://www.pdfsearch.io/img/ec093b45b007a8f0b476cba2056344bd.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2009-12-07 01:34:37
|
---|
12![An Improved ID-based Authenticated Group Key Agreement Schemes An Improved ID-based Authenticated Group Key Agreement Schemes](https://www.pdfsearch.io/img/7fc245429781b6aaf1080d44a00ddc0d.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2003-12-18 02:47:20
|
---|
13![Group-Based Key Pre-Distribution in Wireless Sensor Networks ∗ Donggang Liu CSE Department Group-Based Key Pre-Distribution in Wireless Sensor Networks ∗ Donggang Liu CSE Department](https://www.pdfsearch.io/img/8068d107fe69aaa57f35e1778a3ccaad.jpg) | Add to Reading ListSource URL: discovery.csc.ncsu.eduLanguage: English - Date: 2011-11-09 13:26:21
|
---|
14![On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi On the Relations Between Non-Interactive Key Distribution, Identity-Based Encryption and Trapdoor Discrete Log Groups Kenneth G. Paterson and Sriramkrishnan Srinivasan Information Security Group, Royal Holloway, Universi](https://www.pdfsearch.io/img/c3520cbcd198bbd1b9c57627775e2140.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2009-10-12 12:17:42
|
---|
15![An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials Jan Camenisch1 , Markulf Kohlweiss2 , and Claudio Soriente3 1 2 An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials Jan Camenisch1 , Markulf Kohlweiss2 , and Claudio Soriente3 1 2](https://www.pdfsearch.io/img/e4e08a711579dfe2de37accd34102847.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2008-12-22 05:56:52
|
---|
16![Expiration and Revocation of Keys for Attribute-based Signatures ⋆ Stephen R. Tate1 and Roopa Vishwanathan2 1 Department of Computer Science, UNC Greensboro, Greensboro, NC 27402 Expiration and Revocation of Keys for Attribute-based Signatures ⋆ Stephen R. Tate1 and Roopa Vishwanathan2 1 Department of Computer Science, UNC Greensboro, Greensboro, NC 27402](https://www.pdfsearch.io/img/632952ca764a77789d0e60834cc25056.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2015-05-01 11:41:31
|
---|
17![Solutions to Key Exposure Problem in Ring Signature Joseph K. Liu1 , and Duncan S. Wong2 1 Department of Computer Science Solutions to Key Exposure Problem in Ring Signature Joseph K. Liu1 , and Duncan S. Wong2 1 Department of Computer Science](https://www.pdfsearch.io/img/f99b03f766eb2807431a83694c166f09.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2005-11-23 05:46:43
|
---|
18![Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures S. Sharmila Deva Selvi, S. Sree Vivek! , C. Pandu Rangan! Theoretical Computer Science Laboratory, Department of Computer Science Deterministic Identity Based Signature Scheme and its Application for Aggregate Signatures S. Sharmila Deva Selvi, S. Sree Vivek! , C. Pandu Rangan! Theoretical Computer Science Laboratory, Department of Computer Science](https://www.pdfsearch.io/img/eea3847b3c2e6bec299a1d0fc896f67c.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2011-12-21 04:48:54
|
---|
19![Attack on Two ID-based Authenticated Group Key Agreement Schemes Fangguo Zhang1 and Xiaofeng Chen2 1 2 Attack on Two ID-based Authenticated Group Key Agreement Schemes Fangguo Zhang1 and Xiaofeng Chen2 1 2](https://www.pdfsearch.io/img/b1ad270a00ac5d3e3d03f27d6a618ff3.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2003-12-19 03:05:28
|
---|
20![Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures∗ Siamak F Shahandashti Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures∗ Siamak F Shahandashti ](https://www.pdfsearch.io/img/2267e83a91a330504fd61fe264ecfc69.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2008-05-05 21:04:21
|
---|