1. Lecture Notes in Computer Science;M. Abe,2002
2. B. Adida, S. Hohenberger, R.L. Rivest, Ad-hoc-group signatures from hijacked keypairs. A preliminary version was presented at the DIMACS Workshop on Theft in E-Commerce, 2005. Manuscript available at
http://theory.lcs.mit.edu/~rivest/publications.html
3. Lecture Notes in Computer Science;M. Bellare,2003
4. Lecture Notes in Computer Science;A. Bender,2006
5. Lecture Notes in Computer Science;D. Boneh,2003