Author:
Akagi Norio,Manabe Yoshifumi,Okamoto Tatsuaki
Publisher
Springer Berlin Heidelberg
Reference10 articles.
1. Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28(10), 1030–1044 (1985)
2. Lysyanskaya, A.: Signature Schemes and Applications to Cryptographic Protocol Design. Ph.D thesis, Massachusetts Institute of Technology, Cambridge, MA, USA (2002)
3. Lecture Notes in Computer Science;J. Camenisch,2004
4. Lecture Notes in Computer Science;A. Lysyanskaya,2000
5. Lecture Notes in Computer Science;J. Camenisch,2001
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献