From post

Transformation of Digital Signature Schemes into Designated Confirmer Signature Schemes.

, и . TCC, том 2951 из Lecture Notes in Computer Science, стр. 77-100. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Constant Time Weighted Frequency Estimation for Virtual Network Functionalities., , и . ICCCN, стр. 1-9. IEEE, (2017)PPiTTA - Preserving Privacy in TV Targeted Advertising., и . SECRYPT, стр. 327-332. SciTePress, (2012)STewARD: SDN and blockchain-based Trust evaluation for Automated Risk management on IoT Devices., , , , и . INFOCOM Workshops, стр. 841-846. IEEE, (2019)Constant Time Updates in Hierarchical Heavy Hitters., , , , и . SIGCOMM, стр. 127-140. ACM, (2017)Efficient Hashing of Sparse Virtual Disks., и . SYSTOR, стр. 139. ACM, (2023)Securing Log Files through Blockchain Technology., и . SYSTOR, стр. 131. ACM, (2018)Private Web Search with Malicious Adversaries., и . Privacy Enhancing Technologies, том 6205 из Lecture Notes in Computer Science, стр. 220-235. Springer, (2010)Transformation of Digital Signature Schemes into Designated Confirmer Signature Schemes., и . TCC, том 2951 из Lecture Notes in Computer Science, стр. 77-100. Springer, (2004)Efficient signature scheme for network coding., и . ISIT, стр. 1987-1991. IEEE, (2012)Poster Abstract: Parallel VM Placement with Provable Guarantees., , , , , и . INFOCOM Workshops, стр. 1298-1299. IEEE, (2020)