Search Results

There are 3582 results for: content related to: Generating signatures with optimal overhead: practical paddings for signature schemes

  1. A new certificateless signature scheme under enhanced security models

    Security and Communication Networks

    Kee Sung Kim and Ik Rae Jeong

    Article first published online : 26 MAY 2014, DOI: 10.1002/sec.1036

  2. One-move convertible nominative signature in the standard model

    Security and Communication Networks

    Dennis Y.W. Liu and Duncan S. Wong

    Article first published online : 4 JUL 2013, DOI: 10.1002/sec.812

  3. Authenticated key exchange with synchronized state

    Security and Communication Networks

    Volume 7, Issue 12, December 2014, Pages: 2373–2388, Zheng Yang and Fei Guo

    Article first published online : 10 MAR 2014, DOI: 10.1002/sec.948

  4. Timed-release oblivious transfer

    Security and Communication Networks

    Volume 7, Issue 7, July 2014, Pages: 1138–1149, Lingling Xu, Fangguo Zhang and Shaohua Tang

    Article first published online : 28 AUG 2013, DOI: 10.1002/sec.845

  5. Certificateless and certificate-based signatures from lattices

    Security and Communication Networks

    Miaomiao Tian and Liusheng Huang

    Article first published online : 27 OCT 2014, DOI: 10.1002/sec.1105

  6. n-Evasive all-but-many lossy trapdoor function and its constructions

    Security and Communication Networks

    Zhengan Huang, Shengli Liu and Kefei Chen

    Article first published online : 4 APR 2014, DOI: 10.1002/sec.1002

  7. PPGJ: A privacy-preserving general join for outsourced encrypted database

    Security and Communication Networks

    Volume 7, Issue 8, August 2014, Pages: 1232–1244, Sha Ma, Bo Yang and Mingwu Zhang

    Article first published online : 24 OCT 2013, DOI: 10.1002/sec.854

  8. Secure universal designated verifier identity-based signcryption

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 434–444, Changlu Lin, Fei Tang, Pinhui Ke, Lein Harn and Shengyuan Zhang

    Article first published online : 28 JUN 2013, DOI: 10.1002/sec.820

  9. RCCA security for KEM+DEM style hybrid encryptions and a general hybrid paradigm from RCCA-secure KEMs to CCA-secure encryptions

    Security and Communication Networks

    Volume 7, Issue 8, August 2014, Pages: 1219–1231, Chen Yuan and Dong Qingkuan

    Article first published online : 1 SEP 2013, DOI: 10.1002/sec.853

  10. Certificateless aggregate signature with efficient verification

    Security and Communication Networks

    Yu-Chi Chen, Raylin Tso, Masahiro Mambo, Kaibin Huang and Gwoboa Horng

    Article first published online : 13 NOV 2014, DOI: 10.1002/sec.1166

  11. A local joint fast handoff scheme in cognitive wireless mesh networks

    Security and Communication Networks

    Volume 7, Issue 2, February 2014, Pages: 455–465, Yuan He, Li Xu and Wei Wu

    Article first published online : 23 AUG 2013, DOI: 10.1002/sec.832

  12. Unbiased reconstruction of the large-scale structure

    Monthly Notices of the Royal Astronomical Society

    Volume 331, Issue 4, April 2002, Pages: 901–908, Saleem Zaroubi

    Article first published online : 20 NOV 2002, DOI: 10.1046/j.1365-8711.2002.05229.x

  13. Mastering crosscutting architectural decisions with aspects

    Software: Practice and Experience

    Volume 43, Issue 3, March 2013, Pages: 305–332, Claudio Sant'Anna, Alessandro Garcia, Thais Batista and Awais Rashid

    Article first published online : 26 FEB 2012, DOI: 10.1002/spe.2113

  14. Vandermonde matrix analysis of long-period seismograms

    Geophysical Journal International

    Volume 146, Issue 3, September 2001, Pages: 843–849, Freeman Gilbert

    Article first published online : 20 DEC 2001, DOI: 10.1046/j.1365-246X.2001.00496.x

  15. Foreground component separation with generalized Internal Linear Combination

    Monthly Notices of the Royal Astronomical Society

    Volume 418, Issue 1, November 2011, Pages: 467–476, Mathieu Remazeilles, Jacques Delabrouille and Jean-François Cardoso

    Article first published online : 12 SEP 2011, DOI: 10.1111/j.1365-2966.2011.19497.x

  16. The Economic Effects of the EU Budget: A VAR Analysis

    JCMS: Journal of Common Market Studies

    Volume 46, Issue 5, December 2008, Pages: 933–968, PIERFEDERICO ASDRUBALI and SOYOUNG KIM

    Article first published online : 9 OCT 2008, DOI: 10.1111/j.1468-5965.2008.00825.x

  17. PHANtom: a modern aspect language for Pharo Smalltalk

    Software: Practice and Experience

    Volume 44, Issue 4, April 2014, Pages: 393–412, Johan Fabry and Daniel Galdames

    Article first published online : 19 MAR 2012, DOI: 10.1002/spe.2117

  18. Fréchet kernels for body-wave amplitudes

    Geophysical Journal International

    Volume 150, Issue 2, August 2002, Pages: 440–466, F. A. Dahlen and Adam M. Baig

    Article first published online : 19 JUL 2002, DOI: 10.1046/j.1365-246X.2002.01718.x

  19. Spatial Planning on the Semantic Web

    Transactions in GIS

    Volume 14, Issue 2, April 2010, Pages: 147–161, Rinke Hoekstra, Radboud Winkels and Erik Hupkes

    Article first published online : 15 APR 2010, DOI: 10.1111/j.1467-9671.2010.01188.x

  20. Generalized (identity-based) hash proof system and its applications

    Security and Communication Networks

    Yu Chen, Zongyang Zhang, Dongdai Lin and Zhenfu Cao

    Article first published online : 7 NOV 2013, DOI: 10.1002/sec.827