Author:
Lee Jung-San,Chang Chin-Chen,Fellow, IEEE
Subject
Law,Hardware and Architecture,Software
Reference13 articles.
1. A scheme for threshold multi-secret sharing;Chan;Applied Mathematics and Computation,2005
2. An anonymous voting mechanism based on the key exchange protocol;Chang;Computers and Security,2006
3. Untraceable electronic mail, return addresses and digital pseudonyms;Chaum;Communications of the ACM,1981
4. Blinding for unanticipated signatures;Chaum,1987
5. Publicly verifiable lotteries: applications of delaying functions;Goldschlag,1998
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献