Author:
Fujioka Atsushi,Saito Taiichi,Xagawa Keita
Publisher
Springer Berlin Heidelberg
Reference11 articles.
1. Bellare, M., Namprempre, C., Neven, G.: Security proofs for identity-based identification and signature schemes. Journal of Cryptology 22(1), 1–61 (2009); Preliminary version In: EUROCRYPT 2004 (2004)
2. Lecture Notes in Computer Science;M. Bellare,2002
3. Lecture Notes in Computer Science;J.-J. Chin,2008
4. CCIS;J.-J. Chin,2009
5. Cramer, R.: Modular Design of Secure, yet Practical Cryptographic Protocols. PhD thesis, University of Amsterdam (1996)
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献