Author:
Lee Cheng-Chi,Ho Pi-Fang,Hwang Min-Shiang
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Information Systems,Theoretical Computer Science,Software
Reference22 articles.
1. Chang, C. C., & Chang, Y. F. (2003). Efficient anonymous auction protocols with freewheeling bids. Computers & Security, 22(8), 728–734.
2. Chaum, D. (1982). Blind signatures for untraceable payments. In D. Chaum, R. L. Rivest, & A. T. Sherman (Eds.), Advances in cryptology, CRYPTO’82 (pp. 199–203). New York: Plemum.
3. Chaum, D., & Heyst, E. (1991). Group signatures. In Advances in cryptology, Eurocrypt’91 (pp. 257–265). Lecture Notes in Computer Science.
4. Fan, L., Xu, C. X., & Li, J. H. (2002). Deniable authentication protocol based on Diffie-Hellman algorithm. Electronics Letters, 38(14), 705–706.
5. Franklin, M. K., & Reiter, M. K. (1995). Verifiabe signature sharing. In Advances in cryptology, EUROCRYPT’95 (pp. 50–63). Lecture Notes in Computer Science 921.
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献