Here below is the list of Most Cited Publications about ‘Ring Signature’.
Last updated November 4th, 2017.
Most Cited ‘Ring Signature’ Publications
- “Aggregate and verifiably encrypted signatures from bilinear maps“. D Boneh, C Gentry, B Lynn, H Shacham. 2003. Springer Eurocrypt. 1592 cites.
- “How to leak a secret“. R Rivest, A Shamir, Y Tauman. 2001. Springer Advances in Cryptology—ASIACRYPT …. 1355 cites.
- “Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme“. A Boldyreva. 2003. Springer International Workshop on Public Key Cryptography. 741 cites.
- “Efficient non-interactive proof systems for bilinear groups“. J Groth, A Sahai. 2008. Springer Advances in Cryptology–EUROCRYPT 2008. 637 cites.
- “Diffraction-pattern sampling for automatic pattern recognition“. GG Lendaris, GL Stanley. 1970. ieeexplore.ieee.org Proceedings of the IEEE. 332 cites.
- “1-out-of-n signatures from a variety of keys“. M Abe, M Ohkubo, K Suzuki. 2002. Springer Advances in Cryptology—Asiacrypt 2002. 328 cites.
- “Multi-signatures in the plain public-key model and a general forking lemma“. M Bellare, G Neven. 2006. dl.acm.org Proceedings of the 13th ACM conference on …. 310 cites.
- “Accumulators from Bilinear Pairings and Applications.“. L Nguyen. 2005. Springer CT-RSA. 309 cites.
- “Threshold ring signatures and applications to ad-hoc groups“. E Bresson, J Stern, M Szydlo. 2002. Springer Annual International Cryptology Conference. 304 cites.
- “Sequential Aggregate Signatures and Multisignatures Without Random Oracles.“. S Lu, R Ostrovsky, A Sahai, H Shacham, B Waters. 2006. Springer Eurocrypt. 288 cites.
- “Attribute-based signatures.“. HK Maji, M Prabhakaran, M Rosulek. 2011. Springer CT-RSA. 286 cites.
- “An efficient strong designated verifier signature scheme“. S Saeednia, S Kremer, O Markowitch. 2003. Springer International conference on …. 269 cites.
- “Security models and requirements for healthcare application clouds“. R Zhang, L Liu. 2010. ieeexplore.ieee.org Cloud Computing (CLOUD), 2010 IEEE 3rd …. 261 cites.
- “Universal designated-verifier signatures“. R Steinfeld, L Bull, H Wang, J Pieprzyk. 2003. Springer Asiacrypt. 233 cites.
- “Off-the-record communication, or, why not to use PGP“. N Borisov, I Goldberg, E Brewer. 2004. dl.acm.org … of the 2004 ACM workshop on Privacy …. 229 cites.
- “Oruta: Privacy-preserving public auditing for shared data in the cloud“. B Wang, B Li, H Li. 2012. ieeexplore.ieee.org Cloud Computing (CLOUD), 2012 IEEE 5th …. 229 cites.
- “Linkable spontaneous anonymous group signature for ad hoc groups“. JK Liu, VK Wei, DS Wong. 2004. Springer ACISP. 212 cites.
- “Generalized identity based and broadcast encryption schemes“. D Boneh, M Hamburg. 2008. Springer Advances in Cryptology-ASIACRYPT 2008. 208 cites.
- “Anonymous identification in ad hoc groups“. Y Dodis, A Kiayias, A Nicolosi, V Shoup. 2004. Springer Eurocrypt. 207 cites.
- “Pairing-Based Cryptographic Protocols: A Survey.“. R Dutta, R Barua, P Sarkar. 2004. researchgate.net IACR Cryptology ePrint Archive. 207 cites.
- “Practical Short Signature Batch Verification.“. AL Ferrara, M Green, S Hohenberger, MØ Pedersen. 2009. Springer CT-RSA. 206 cites.
- “Ring signatures: Stronger definitions, and constructions without random oracles“. A Bender, J Katz, R Morselli. 2006. Springer TCC. 205 cites.
- “Attribute-based signature and its applications“. J Li, MH Au, W Susilo, D Xie, K Ren. 2010. dl.acm.org … of the 5th ACM Symposium on …. 204 cites.
- “Concurrent signatures“. L Chen, C Kudla, KG Paterson. 2004. Springer … on the Theory and Applications of …. 187 cites.
- “Threshold attribute-based signatures and their application to anonymous credential systems.“. SF Shahandashti, R Safavi-Naini. 2009. Springer Africacrypt. 180 cites.
- “Privacy preserving access control with authentication for securing data in clouds“. S Ruj, M Stojmenovic, A Nayak. 2012. ieeexplore.ieee.org Cluster, Cloud and Grid …. 179 cites.
- “Knox: privacy-preserving auditing for shared data with large groups in the cloud“. B Wang, B Li, H Li. 2012. Springer Applied cryptography and network security. 175 cites.
- “Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance.“. HK Maji, M Prabhakaran, M Rosulek. 2008. eprint.iacr.org IACR Cryptology ePrint Archive. 170 cites.
- “Efficient identity based ring signature“. SSM Chow, SM Yiu, LCK Hui. 2005. Springer International Conference on Applied …. 164 cites.
- “Deniable ring authentication“. M Naor. 2002. Springer Crypto. 158 cites.
- “Disc galaxies with multiple triaxial structures. II. JHK surface photometry and numerical simulations“. D Friedli, H Wozniak, M Rieke, L Martinet…. 1996. aas.aanda.org Astronomy and …. 158 cites.
- “New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing.“. F Zhang, R Safavi-Naini, CY Lin. 2003. eprint.iacr.org IACR Cryptology EPrint Archive. 154 cites.
- “Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map.“. F Laguillaumie, D Vergnaud. 2004. Springer SCN. 152 cites.
- “Forking lemmas for ring signature schemes“. J Herranz, G Sáez. 2003. Springer International Conference on Cryptology in India. 151 cites.
- “Charm: a framework for rapidly prototyping cryptosystems“. JA Akinyele, C Garman, I Miers, MW Pagano…. 2013. Springer Journal of Cryptographic …. 150 cites.
- “Blacklistable anonymous credentials: blocking misbehaving users without ttps“. PP Tsang, MH Au, A Kapadia, SW Smith. 2007. dl.acm.org Proceedings of the 14th ACM …. 149 cites.
- “Batch Verifications with ID-Based Signatures.“. HJ Yoon, JH Cheon, Y Kim. 2004. Springer ICISC. 148 cites.
- “Oruta: Privacy-preserving public auditing for shared data in the cloud“. B Wang, B Li, H Li. 2014. ieeexplore.ieee.org IEEE transactions on cloud computing. 144 cites.
- “Hidden attribute-based signatures without anonymity revocation“. J Li, K Kim. 2010. Elsevier Information Sciences. 139 cites.
- “Efficient ring signatures without random oracles“. H Shacham, B Waters. 2007. Springer Public Key Cryptography. 130 cites.
- “ID-based ring signature and proxy ring signature schemes from bilinear pairings“. AK Awasthi, S Lal. 2005. arxiv.org arXiv preprint cs/0504097. 130 cites.
- “Short linkable ring signatures for e-voting, e-cash and attestation“. PP Tsang, VK Wei. 2005. Springer ISPEC. 121 cites.
- “On the generic construction of identity-based signatures with additional properties“. D Galindo, J Herranz, E Kiltz. 2006. Springer Asiacrypt. 117 cites.
- “Dissent: accountable anonymous group messaging“. H Corrigan-Gibbs, B Ford. 2010. dl.acm.org Proceedings of the 17th ACM conference on …. 116 cites.
- “Efficient attribute-based signatures for non-monotone predicates in the standard model“. T Okamoto, K Takashima. 2011. Springer International Workshop on Public Key …. 114 cites.
- “Dating past geomorphic processes with tangential rows of traumatic resin ducts“. M Stoffel. 2008. Elsevier Dendrochronologia. 108 cites.
- “Multi-designated verifiers signatures“. F Laguillaumie, D Vergnaud. 2004. Springer ICICS. 107 cites.
- “Charged particle depletion surrounding Saturn’s F ring: Evidence for a moonlet belt?“. JN Cuzzi, JA Burns. 1988. Elsevier Icarus. 106 cites.
- “Trustworthy privacy-preserving car-generated announcements in vehicular ad hoc networks“. V Daza, J Domingo-Ferrer, F Sebé…. 2009. ieeexplore.ieee.org IEEE Transactions on …. 106 cites.
- “Identity based undeniable signatures“. B Libert, JJ Quisquater. 2004. Springer CT-RSA. 100 cites.
- “Voyager planetary radio astronomy at Neptune“. JW Warwick, DR Evans, GR Peltzer, RG Peltzer…. 1989. search.proquest.com Science. 98 cites.
- “ID-based ring signature scheme secure in the standard model“. MH Au, JK Liu, TH Yuen, DS Wong. 2006. Springer International Workshop on Security. 97 cites.
- “Mesh signatures“. X Boyen. 2007. Springer Annual International Conference on the Theory and …. 97 cites.
- “New identity-based ring signature schemes“. J Herranz, G Sáez. 2004. Springer ICICS. 97 cites.
- “Perfect concurrent signature schemes“. W Susilo, Y Mu, F Zhang. 2004. Springer Information and Communications Security. 96 cites.
- “Cyberentity security in the internet of things“. H Ning, H Liu, LT Yang. 2013. ieeexplore.ieee.org Computer. 94 cites.
- “Identity Based Threshold Ring Signature.“. SSM Chow, LCK Hui, SM Yiu. 2004. Springer ICISC. 92 cites.
- “New approaches for deniable authentication“. M Di Raimondo, R Gennaro. 2005. dl.acm.org Proceedings of the 12th ACM conference …. 91 cites.
- “Palaeoflood records for the Red River, Manitoba, Canada, derived from anatomical tree-ring signatures“. SS George, E Nielsen. 2003. journals.sagepub.com The Holocene. 91 cites.
- “Attribute Based Group Signatures.“. D Khader. 2007. eprint.iacr.org IACR Cryptology ePrint Archive. 90 cites.
- “Separable Linkable Threshold Ring Signatures.“. PP Tsang, VK Wei, TK Chan, MH Au, JK Liu, DS Wong. 2004. Springer Indocrypt. 90 cites.
- “Short Attribute-Based Signatures for Threshold Predicates.“. J Herranz, F Laguillaumie, B Libert, C Ràfols. 2012. Springer CT-RSA. 89 cites.
- “Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world“. X Huang, W Susilo, Y Mu…. 2005. ieeexplore.ieee.org … Information Networking and …. 86 cites.
- “Ring signatures without random oracles“. SSM Chow, VK Wei, JK Liu, TH Yuen. 2006. dl.acm.org … of the 2006 ACM Symposium on …. 86 cites.
- “A New ID-based Signature with Batch Verification.“. JH Cheon, Y Kim, HJ Yoon. 2004. icms.kaist.ac.kr IACR Cryptology EPrint Archive. 83 cites.
- “Ring signatures of sub-linear size without random oracles“. N Chandran, J Groth, A Sahai. 2007. Springer Automata, Languages and Programming. 82 cites.
- “Certificate based (linkable) ring signature“. MH Au, JK Liu, W Susilo, TH Yuen. 2007. Springer International Conference on …. 81 cites.
- “On the Portability of Generalized Schnorr Proofs.“. J Camenisch, A Kiayias, M Yung. 2009. Springer EUROCRYPT. 81 cites.
- “Short designated verifier signature scheme and its identity-based variant“. X Huang, W Susilo, Y Mu, F Zhang. 2008. ro.uow.edu.au . 80 cites.
- “User-private information retrieval based on a peer-to-peer community“. J Domingo-Ferrer, M Bras-Amorós, Q Wu…. 2009. Elsevier Data & Knowledge …. 78 cites.
- “Property-based attestation without a trusted third party“. L Chen, H Löhr, M Manulis, AR Sadeghi. 2008. Springer Information Security. 77 cites.
- “Survey on anonymous communications in computer networks“. J Ren, J Wu. 2010. Elsevier Computer Communications. 76 cites.
- “Attribute-Based Ring Signatures.“. J Li, K Kim. 2008. researchgate.net IACR Cryptology EPrint Archive. 75 cites.
- “Policy-based cryptography and applications“. W Bagga, R Molva. 2005. Springer Financial Cryptography. 75 cites.
- “Revocable attribute-based signatures with adaptive security in the standard model“. A Escala, J Herranz, P Morillo. 2011. Springer Progress in Cryptology–AFRICACRYPT …. 74 cites.
- “Tree-ring response of Populus tremula L. and Quercus robur L. to recent spring floods of the Saône River, France“. L Astrade, Y Bégin. 1997. Taylor & Francis Ecoscience. 73 cites.
- “The power of proofs-of-possession: Securing multiparty signatures against rogue-key attacks“. T Ristenpart, S Yilek. 2007. Springer Eurocrypt. 72 cites.
- “A separable threshold ring signature scheme“. JK Liu, VK Wei, DS Wong. 2003. Springer International Conference on Information …. 70 cites.
- “Footprint: detecting Sybil attacks in urban vehicular networks“. S Chang, Y Qi, H Zhu, J Zhao…. 2012. ieeexplore.ieee.org IEEE Transactions on …. 70 cites.
- “A new efficient threshold ring signature scheme based on coding theory“. CA Melchor, PL Cayrel, P Gaborit…. 2011. ieeexplore.ieee.org IEEE Transactions on …. 69 cites.
- “How to leak a secret: Theory and applications of ring signatures“. RL Rivest, A Shamir, Y Tauman. 2006. Springer Essays in memory of Shimon Even. 68 cites.
- “Calibration of floodplain roughness and estimation of flood discharge based on tree-ring evidence and hydraulic modelling“. JA Ballesteros, JM Bodoque, A Díez-Herrero…. 2011. Elsevier Journal of …. 67 cites.
- “Decentralized Attribute-Based Signatures.“. T Okamoto, K Takashima. 2013. Springer Public Key Cryptography. 67 cites.
- “Historical patterns of western spruce budworm and Douglas-fir tussock moth outbreaks in the northern Blue Mountains, Oregon, since AD 1700.“. TW Swetnam, BE Wickman, HG Paul, CH Baisan. 1995. researchgate.net . 67 cites.
- “Cryptography from pairings“. KG Paterson. 2006. win.tue.nl London mathematical society lecture note series. 66 cites.
- “Claromatic carbon nanostructures“. AT Balaban, DJ Klein. 2009. ACS Publications The Journal of Physical Chemistry C. 64 cites.
- “Identity based strong designated verifier signature scheme“. PK Kancharla, S Gummadidala, A Saxena. 2007. content.iospress.com Informatica. 64 cites.
- “Privacy in content-oriented networking: Threats and countermeasures“. A Chaabane, E De Cristofaro, MA Kaafar…. 2013. dl.acm.org ACM SIGCOMM …. 64 cites.
- “A hydrographic section from South Africa to the southern limit of the Antarctic Circumpolar Current at the Greenwich meridian“. S Gladyshev, M Arhan, A Sokov, S Speich. 2008. Elsevier Deep Sea Research Part I …. 62 cites.
- “An identity-based ring signature scheme from bilinear pairings“. CY Lin, TC Wu. 2004. ieeexplore.ieee.org … Networking and Applications, 2004. AINA 2004 …. 62 cites.
- “Analytic Novikov for topologists“. J Rosenberg. 1995. mmas.univ-metz.fr Novikov conjectures, index theorems and rigidity. 62 cites.
- “The fairness of perfect concurrent signatures“. G Wang, F Bao, J Zhou. 2006. Springer Information and Communications Security. 62 cites.
- “K-anonymous secret handshakes with reusable credentials“. S Xu, M Yung. 2004. dl.acm.org Proceedings of the 11th ACM conference on Computer …. 60 cites.
- “Location privacy in urban sensing networks: research challenges and directions [security and privacy in emerging wireless networks]“. I Krontiris, FC Freiling, T Dimitriou. 2010. ieeexplore.ieee.org IEEE Wireless …. 60 cites.
- “Cost-effective authentic and anonymous data sharing with forward security“. X Huang, JK Liu, S Tang, Y Xiang…. 2015. ieeexplore.ieee.org IEEE Transactions …. 59 cites.
- “Predicting photometric and spectroscopic signatures of rings around transiting extrasolar planets“. Y Ohta, A Taruya, Y Suto. 2008. iopscience.iop.org The Astrophysical Journal. 59 cites.
- “The dust halo of Saturn’s largest icy moon, Rhea“. GH Jones, E Roussos, N Krupp, U Beckmann…. 2008. science.sciencemag.org …. 59 cites.
- “Formation and evolution of planetary systems: upper limits to the gas mass in HD 105“. D Hollenbach, U Gorti, M Meyer, JS Kim…. 2005. iopscience.iop.org The Astrophysical …. 58 cites.
- “Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model.“. B Libert, D Vergnaud. 2009. Springer CANS. 58 cites.
- “Traceable ring signature“. E Fujisaki, K Suzuki. 2007. Springer Public Key Cryptography. 58 cites.
- “Ring signatures: Stronger definitions, and constructions without random oracles“. A Bender, J Katz, R Morselli. 2009. Springer Journal of Cryptology. 57 cites.
- “Generic construction of (identity-based) perfect concurrent signatures“. SSM Chow, W Susilo. 2005. Springer International Conference on Information and …. 56 cites.
- “On the RS-code construction of ring signature schemes and a threshold setting of RST“. DS Wong, K Fung, JK Liu, VK Wei. 2003. Springer ICICS. 55 cites.
- “Efficient zero-knowledge authentication based on a linear algebra problem MinRank“. N Courtois. 2001. Springer ASIACRYPT. 54 cites.
- “Short linkable ring signatures revisited“. MH Au, SSM Chow, W Susilo, PP Tsang. 2006. Springer European Public Key …. 54 cites.
- “An identity-based ring signature scheme with enhanced privacy“. C Gamage, B Gras, B Crispo…. 2006. ieeexplore.ieee.org … and Workshops, 2006. 53 cites.
- “Privacy-preserving public auditing for shared cloud data supporting group dynamics“. B Wang, H Li, M Li. 2013. ieeexplore.ieee.org Communications (ICC), 2013 IEEE …. 53 cites.
- “Convertible ring signature“. KC Lee, HA Wen, T Hwang. 2005. IET IEE Proceedings-Communications. 52 cites.
- “Efficient optimistic fair exchange secure in the multi-user setting and chosen-key model without random oracles“. Q Huang, G Yang, DS Wong, W Susilo. 2008. Springer Lecture Notes in Computer …. 52 cites.
- “Ambiguous optimistic fair exchange“. Q Huang, G Yang, DS Wong, W Susilo. 2008. Springer … on the Theory and Application of …. 51 cites.
- “Asymmetric concurrent signatures“. K Nguyen. 2005. Springer ICICS. 51 cites.
- “Threshold Attribute-Based Signcryption.“. M Gagné, S Narayan, R Safavi-Naini. 2010. Springer SCN. 51 cites.
- “Certificateless threshold ring signature“. S Chang, DS Wong, Y Mu, Z Zhang. 2009. Elsevier Information Sciences. 50 cites.
- “Generalized digital certificate for user authentication and key establishment for secure communications“. L Harn, J Ren. 2011. ieeexplore.ieee.org IEEE Transactions on Wireless …. 50 cites.
- “Identity-based ring signatures from RSA“. J Herranz. 2007. Elsevier Theoretical Computer Science. 50 cites.
- “Linkable ring signatures: Security models and new schemes“. JK Liu, DS Wong. 2005. Springer … Conference on Computational Science and Its …. 50 cites.
- “Anonymous proxy signatures“. G Fuchsbauer, D Pointcheval. 2008. Springer … on Security and Cryptography for Networks. 49 cites.
- “Toward the fair anonymous signatures: Deniable ring signatures“. Y Komano, K Ohta, A Shimbo, S Kawamura. 2006. Springer CT-RSA. 48 cites.
- “Policy-Based Signatures.“. M Bellare, G Fuchsbauer. 2014. eprint.iacr.org Public Key Cryptography. 47 cites.
- “Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.“. C Chen, J Chen, HW Lim, Z Zhang, D Feng, S Ling…. 2013. Springer CT-RSA. 46 cites.
- “Multi-party concurrent signatures“. D Tonien, W Susilo, R Safavi-Naini. 2006. Springer ISC. 46 cites.
- “Non-interactive deniable ring authentication“. W Susilo, Y Mu. 2003. Springer International Conference on Information Security and …. 46 cites.
- “Routes of Agulhas rings in the southeastern Cape Basin“. G Dencausse, M Arhan, S Speich. 2010. Elsevier Deep Sea Research Part I …. 46 cites.
- “Universal designated verifier signatures without random oracles or non-black box assumptions“. F Laguillaumie, B Libert, JJ Quisquater. 2006. Springer SCN. 44 cites.
- “A ring signature scheme using bilinear pairings“. J Xu, Z Zhang, D Feng. 2004. Springer International Workshop on Information Security …. 43 cites.
- “Composability and On-Line Deniability of Authentication.“. Y Dodis, J Katz, AD Smith, S Walfish. 2009. Springer TCC. 43 cites.
- “Identity based ring signature: Why, how and what next“. SSM Chow, RWC Lui, LCK Hui, SM Yiu. 2005. Springer EuroPKI. 43 cites.
- “On the security models of (threshold) ring signature schemes“. JK Liu, DS Wong. 2004. Springer International Conference on Information Security and …. 43 cites.
- “A suite of non-pairing id-based threshold ring signature schemes with different levels of anonymity“. PP Tsang, MH Au, JK Liu, W Susilo, DS Wong. 2010. Springer ProvSec. 42 cites.
- “Finding composite order ordinary elliptic curves using the Cocks–Pinch method“. D Boneh, K Rubin, A Silverberg. 2011. Elsevier Journal of Number Theory. 42 cites.
- “Revocable ring signature“. DYW Liu, JK Liu, Y Mu, W Susilo, DS Wong. 2007. Springer Journal of Computer Science …. 41 cites.
- “The Tree-Ring Record of Drought on the Canadian Prairies a, b“. S St. George, DM Meko, MP Girardin…. 2009. journals.ametsoc.org Journal of …. 41 cites.
- “A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model.“. Z Brakerski, YT Kalai. 2010. microsoft.com IACR Cryptology ePrint Archive. 40 cites.
- “A provably secure ring signature scheme in certificateless cryptography“. L Zhang, F Zhang, W Wu. 2007. Springer provsec. 40 cites.
- “On the security of auditing mechanisms for secure cloud storage“. Y Yu, L Niu, G Yang, Y Mu, W Susilo. 2014. Elsevier Future Generation Computer Systems. 39 cites.
- “Security, privacy, and accountability in wireless access networks“. W Lou, K Ren. 2009. ieeexplore.ieee.org IEEE Wireless Communications. 39 cites.
- “Automatic classification of spatial signatures on semiconductor wafermaps“. KW Tobin, SS Gleason…. 1997. proceedings.spiedigitallibrary.org SPIE’s 22nd …. 38 cites.
- “One-Time Signatures and Chameleon Hash Functions.“. P Mohassel. 2010. Springer Selected Areas in Cryptography. 38 cites.
- “Solutions to Key Exposure Problem in Ring Signature.“. JK Liu, DS Wong. 2008. eprint.iacr.org IJ Network Security. 38 cites.
- “A Lattice-Based Threshold Ring Signature Scheme.“. PL Cayrel, R Lindner, M Rückert, R Silva. 2010. Springer LATINCRYPT. 37 cites.
- “Efficient and spontaneous privacy-preserving protocol for secure vehicular communication“. H Xiong, K Beznosov, Z Qin…. 2010. ieeexplore.ieee.org … (ICC), 2010 IEEE …. 37 cites.
- “Tripartite concurrent signatures“. W Susilo, Y Mu. 2005. Springer Security and Privacy in the Age of Ubiquitous …. 37 cites.
- “Blind spontaneous anonymous group signatures for ad hoc groups“. TK Chan, K Fung, JK Liu, VK Wei. 2004. Springer ESAS. 36 cites.
- “Verifiable ring signature“. J Lv, X Wang. 2003. sites.google.com Proc. of DMS 2003-The 9th International …. 36 cites.
- “Anonymous Webs of Trust.“. M Backes, S Lorenz, M Maffei, K Pecina. 2010. Springer Privacy Enhancing Technologies. 35 cites.
- “Improved short lattice signatures in the standard model“. L Ducas, D Micciancio. 2014. Springer International Cryptology Conference. 35 cites.
- “List signature schemes“. S Canard, B Schoenmakers, M Stam…. 2006. Elsevier Discrete Applied …. 35 cites.
- “Quasi-Dyadic CFS Signatures.“. PSLM Barreto, PL Cayrel, R Misoczki, R Niebuhr. 2010. Springer Inscrypt. 35 cites.
- “Subpixel image registration using circular fiducials“. A Efrat, C Gotsman. 1994. World Scientific International Journal of Computational …. 35 cites.
- “Archaeological tree-ring dating at the millennium“. SE Nash. 2002. Springer Journal of Archaeological Research. 34 cites.
- “Constant-size ID-based linkable and revocable-iff-linked ring signature“. MH Au, JK Liu, W Susilo, TH Yuen. 2006. Springer InDOcRYPT. 34 cites.
- “Fighting phishing attacks: A lightweight trust architecture for detecting spoofed emails“. B Adida, S Hohenberger…. 2005. pdfs.semanticscholar.org DIMACS Wkshp on …. 34 cites.
- “Role-dependent privacy preservation for secure V2G networks in the smart grid“. H Liu, H Ning, Y Zhang, Q Xiong…. 2014. ieeexplore.ieee.org IEEE Transactions on …. 34 cites.
- “Universal designated verifier ring signature (proof) without random oracles“. J Li, Y Wang. 2006. Springer EUC Workshops. 34 cites.
- “Escrowed linkability of ring signatures and its applications“. SSM Chow, W Susilo, TH Yuen. 2006. Springer VIETCRYPT. 33 cites.
- “Provably Secure Code-Based Threshold Ring Signatures.“. L Dallot, D Vergnaud. 2009. Springer IMA Int. Conf.. 33 cites.
- “A survey of ring signature“. L Wang, G Zhang, C Ma. 2008. Springer Frontiers of Electrical and Electronic Engineering …. 32 cites.
- “An efficient and provable secure identity-based ring signcryption scheme“. ZC Zhu, Y Zhang, F Wang. 2009. Elsevier Computer standards & interfaces. 32 cites.
- “Blind ring signatures secure under the chosen-target-CDH assumption“. J Herranz, F Laguillaumie. 2006. Springer ISC. 32 cites.
- “Fully Anonymous Attribute Tokens from Lattices.“. J Camenisch, G Neven, M Rückert. 2012. Springer SCN. 32 cites.
- “Short group signatures with controllable linkability“. JY Hwang, S Lee, BH Chung, HS Cho…. 2011. ieeexplore.ieee.org … Security & Privacy …. 32 cites.
- “Anonymity 2.0-X. 509 extensions supporting privacy-friendly authentication“. V Benjumea, SG Choi, J Lopez, M Yung. 2007. Springer CANS. 31 cites.
- “Multi-designated verifiers signatures: anonymity without encryption“. F Laguillaumie, D Vergnaud. 2007. Elsevier Information Processing Letters. 31 cites.
- “Proxy ring signature: formal definitions, efficient construction and new variant“. J Li, TH Yuen, X Chen, Y Wang. 2006. ieeexplore.ieee.org … Intelligence and Security …. 31 cites.
- “Robust Receipt-Free Election System with Ballot Secrecy and Verifiability.“. SSM Chow, JK Liu, DS Wong. 2008. internetsociety.org NDSS. 31 cites.
- “Towards an anonymous access control and accountability scheme for cloud computing“. M Jensen, S Schäge, J Schwenk. 2010. ieeexplore.ieee.org Cloud Computing (CLOUD) …. 31 cites.
- “Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05“. F Zhang, X Chen. 2009. Elsevier Information Processing Letters. 30 cites.
- “Deniable ring authentication revisited“. W Susilo, Y Mu. 2004. Springer ACNS. 30 cites.
- “Anonymous authentication“. Y Lindell. 2007. repository.cmu.edu Journal of Privacy and Confidentiality. 29 cites.
- “Maximum eigenvalues of the reciprocal distance matrix and the reverse Wiener matrix“. B Zhou, N Trinajstić. 2008. Wiley Online Library International Journal of Quantum …. 29 cites.
- “Designated verifier signature: definition, framework and new constructions“. Y Li, W Susilo, Y Mu, D Pei. 2007. Springer Ubiquitous Intelligence and Computing. 28 cites.
- “Macrofossil and tree-ring evidence for a long-term forest succession and mid-Holocene hemlock decline“. L Filion, F Quinty. 1993. Elsevier Quaternary Research. 28 cites.
- “Security and privacy in wireless sensor networks“. A Ukil. 2010. intechopen.com Smart Wireless Sensor Networks. 28 cites.
- “A new ring signature scheme with signer-admission property“. CH Wang, CY Liu. 2007. Elsevier Information Sciences. 27 cites.
- “Cutting through the Confusion: A Measurement Study of Homograph Attacks.“. T Holgers, DE Watson, SD Gribble. 2006. static.usenix.org USENIX Annual Technical …. 27 cites.
- “Efficient secret authenticatable anonymous signcryption scheme with identity privacy“. M Zhang, B Yang, S Zhu, W Zhang. 2008. Springer International Conference on …. 27 cites.
- “A novel verifiably encrypted signature scheme without random oracle“. J Zhang, J Mao. 2007. Springer … Conference on Information Security Practice and …. 26 cites.
- “Efficient and multi-level privacy-preserving communication protocol for VANET“. H Xiong, Z Chen, F Li. 2012. Elsevier Computers & Electrical Engineering. 26 cites.
- “Providing hop-by-hop authentication and source privacy in wireless sensor networks“. Y Li, J Li, J Ren, J Wu. 2012. ieeexplore.ieee.org INFOCOM, 2012 Proceedings IEEE. 26 cites.
- “A-Train observations of deep convective storm tops“. M Setvák, K Bedka, DT Lindsey, A Sokol, Z Charvát…. 2013. Elsevier Atmospheric …. 25 cites.
- “Certificateless Ring Signatures.“. SSM Chow, WS Yap. 2007. eprint.iacr.org IACR Cryptology ePrint Archive. 25 cites.
- “Generalized ring signatures“. J Ren, L Harn. 2008. ieeexplore.ieee.org IEEE Transactions on Dependable and Secure …. 25 cites.
- “On the security of an identity based multi-proxy signature scheme“. H Xiong, J Hu, Z Chen, F Li. 2011. Elsevier Computers & Electrical Engineering. 25 cites.
- “On the security of an identity based multi-proxy signature scheme“. H Xiong, J Hu, Z Chen, F Li. 2011. Elsevier Computers & Electrical Engineering. 25 cites.
- “PPAA: Peer-to-peer anonymous authentication“. P Tsang, S Smith. 2008. Springer Applied Cryptography and Network Security. 25 cites.
- “Server-aided signatures verification secure against collusion attack“. SSM Chow, MH Au, W Susilo. 2013. Elsevier Information Security Technical Report. 25 cites.
- “Construction of universal designated-verifier signatures and identity-based signatures from standard signatures“. S Shahandashti, R Safavi-Naini. 2008. Springer Public Key Cryptography–PKC 2008. 24 cites.
- “Electronic group signature method with revocable anonymity, equipment and programs for implementing the method“. DA Modiano, L Frisch, D Mouton. 2009. Google Patents US Patent 7,526,651. 24 cites.
- “ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things“. J Su, D Cao, B Zhao, X Wang, I You. 2014. Elsevier Future Generation Computer Systems. 24 cites.
- “Extended Artin-Schreier theory of fields“. E Becker. 1984. JSTOR The Rocky Mountain Journal of Mathematics. 24 cites.
- “Lightweight email signatures“. B Adida, D Chau, S Hohenberger, RL Rivest. 2006. Springer SCN. 24 cites.
- “Tracing-by-linking group signatures“. V Wei. 2005. Springer Information Security. 24 cites.
- “A Novel ID-Based Anonymous Signcryption Scheme.“. J Zhang, S Gao, H Chen, Q Geng. 2009. Springer APWeb/WAIM. 23 cites.
- “Analysis and improvements of two identity-based perfect concurrent signature schemes“. Z Huang, K Chen, X Lin, R Huang. 2007. content.iospress.com Informatica. 23 cites.
- “Code-based Ring Signature Scheme.“. D Zheng, X Li, K Chen. 2007. pdfs.semanticscholar.org IJ Network Security. 23 cites.
- “Domain-specific pseudonymous signatures for the German identity card“. J Bender, Ö Dagdelen, M Fischlin, D Kügler. 2012. Springer Information Security. 23 cites.
- “Privacy-preserving smart metering with regional statistics and personal enquiry services“. CK Chu, JK Liu, JW Wong, Y Zhao, J Zhou. 2013. dl.acm.org Proceedings of the 8th ACM …. 23 cites.
- “Self-organized Anonymous Authentication in Mobile Ad Hoc Networks.“. J Freudiger, M Raya, JP Hubaux. 2009. Springer SecureComm. 23 cites.
- “Separable identity-based ring signatures: Theoretical foundations for fighting phishing attacks“. B Adida, S Hohenberger…. 2005. pdfs.semanticscholar.org … of DIMACS Workshop …. 23 cites.
- “Tree ring effects and ice core acidities clarify the volcanic record of the first millennium“. MGL Baillie, J McAneney. 2015. clim-past.net Climate of the Past. 23 cites.
- “Bidder-anonymous English auction protocol based on revocable ring signature“. H Xiong, Z Chen, F Li. 2012. Elsevier Expert Systems with Applications. 22 cites.
- “Linkable democratic group signatures“. M Manulis, AR Sadeghi, J Schwenk. 2006. Springer International Conference on …. 22 cites.
- “Traceable ring signature“. E Fujisaki, K Suzuki. 2008. search.ieice.org IEICE transactions on fundamentals of …. 22 cites.
- “A simple transitive signature scheme for directed trees“. G Neven. 2008. Elsevier Theoretical Computer Science. 21 cites.
- “Accumulators and U-Prove revocation“. T Acar, SSM Chow, L Nguyen. 2013. Springer International Conference on Financial …. 21 cites.
- “How to compress Rabin ciphertexts and signatures (and more)“. C Gentry. 2004. Springer Advances in Cryptology–CRYPTO 2004. 21 cites.
- “How to share a secret“. RL Rivest, A Shamir, Y Tauman. 1979. Citeseer Communications of the ACM. 21 cites.
- “A provably secure ID-based ring signature scheme.“. J Herranz, G Sáez. 2003. eprint.iacr.org IACR Cryptology ePrint Archive. 20 cites.
- “An efficient anonymous authentication mechanism for delay tolerant networks“. R Su, Z Cao. 2010. Elsevier Computers & Electrical Engineering. 20 cites.
- “Anonymous signatures made easy“. M Fischlin. 2007. Springer Public Key Cryptography. 20 cites.
- “Attribute Based Signatures for Bounded Multi-level Threshold Circuits.“. S Kumar, S Agrawal, S Balaraman, CP Rangan. 2010. Springer EuroPKI. 20 cites.
- “Cyclic conjugation in fluoranthene and its benzo-derivatives. Part 1. Catacondensed systems“. J Đurđević, I Gutman, J Terzić…. 2009. Taylor & Francis Polycyclic Aromatic …. 20 cites.
- “Efficient and strongly unforgeable identity‐based signature scheme from lattices in the standard model“. Z Liu, Y Hu, X Zhang, F Li. 2013. Wiley Online Library Security and communication …. 20 cites.
- “Forward Secure Ring Signature without Random Oracles.“. JK Liu, TH Yuen, J Zhou. 2011. Springer ICICS. 20 cites.
- “Providing source privacy in mobile ad hoc networks“. J Ren, Y Li, T Li. 2009. ieeexplore.ieee.org Mobile Adhoc and Sensor Systems, 2009 …. 20 cites.
- “Sanitizable Signatures Revisited.“. TH Yuen, W Susilo, JK Liu, Y Mu. 2008. Springer CANS. 20 cites.
- “Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction“. MH Au, JK Liu, W Susilo, TH Yuen. 2013. Elsevier Theoretical Computer Science. 20 cites.
- “π-Electron partitions, signatures, and Clar structures of selected benzenoid hydrocarbons“. AT Balaban, M Pompe, M Randić. 2008. ACS Publications The Journal of Physical …. 20 cites.
- “Group-oriented fair exchange of signatures“. Q Huang, DS Wong, W Susilo. 2011. Elsevier Information Sciences. 19 cites.
- “On perspective of security and privacy-preserving solutions in the internet of things“. L Malina, J Hajny, R Fujdiak, J Hosek. 2016. Elsevier Computer Networks. 19 cites.
- “Resisting Traitors in Linkable Democratic Group Signatures.“. MH Ibrahim. 2009. ijns.jalaxy.com.tw IJ Network Security. 19 cites.
- “Ring signature with designated linkability“. JK Liu, W Susilo, DS Wong. 2006. Springer International Workshop on Security. 19 cites.
- “Sub-linear Size Traceable Ring Signatures without Random Oracles.“. E Fujisaki. 2011. Springer CT-RSA. 19 cites.
- “The SPARTA pseudonym and authorization system“. G Bianchi, M Bonola, V Falletta, FS Proto…. 2008. Elsevier Electronic Notes in …. 19 cites.
- “A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys.“. S Schäge, J Schwenk. 2010. Springer Financial Cryptography. 18 cites.
- “Constructing strong identity-based designated verifier signatures with self-unverifiability“. JH Ki, JY Hwang, DH Nyang, BH Chang, DH Lee, J Lim. 2012. etrij.etri.re.kr ETRI Journal. 18 cites.
- “Enhanced security models and a generic construction approach for linkable ring signature“. JK Liu, DS Wong. 2006. World Scientific … Journal of Foundations of Computer Science. 18 cites.
- “G2C: Cryptographic Protocols from Goal-Driven Specifications.“. M Backes, M Maffei, K Pecina, RM Reischuk. 2011. Springer TOSCA. 18 cites.
- “Ring signature schemes for general ad-hoc access structures“. J Herranz, G Sáez. 2004. Springer ESAS. 18 cites.
- “Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions“. B Libert, S Ling, F Mouhartem, K Nguyen…. 2016. Springer Advances in Cryptology …. 18 cites.
- “Strontium isotopic and tree-ring signatures of Cedrus brevifolia in Cyprus“. S Rich, SW Manning, P Degryse…. 2012. pubs.rsc.org Journal of Analytical …. 18 cites.
- “A Certificateless Proxy Ring Signature Scheme with Provable Security.“. H Xiong, Z Qin, F Li. 2011. pdfs.semanticscholar.org IJ Network Security. 17 cites.
- “An efficient static blind ring signature scheme“. Q Wu, F Zhang, W Susilo, Y Mu. 2005. Springer ICISC. 17 cites.
- “Attribute-based ring signature scheme with constant-size signature“. W Wenqiang, C Shaozhen. 2010. IET IET Information Security. 17 cites.
- “Ip address authorization for secure address proxying using multi-key cgas and ring signatures“. J Kempf, J Wood, Z Ramzan, C Gentry. 2006. Springer Advances in Information and …. 17 cites.
- “Linkable ring signature with unconditional anonymity“. JK Liu, MH Au, W Susilo, J Zhou. 2014. ieeexplore.ieee.org IEEE Transactions on …. 17 cites.
- “Review of nucleon decay searches at Super-Kamiokande“. V Takhistov. 2016. arxiv.org arXiv preprint arXiv:1605.03235. 17 cites.
- “Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors“. B Libert, S Ling, K Nguyen, H Wang. 2016. Springer … on the Theory and Applications of …. 17 cites.
- “A secure ring signcryption scheme for private and anonymous communication“. L Wang, G Zhang, C Ma. 2007. ieeexplore.ieee.org Network and Parallel Computing …. 16 cites.
- “Attribute‐based ring signcryption scheme“. Z Guo, M Li, X Fan. 2013. Wiley Online Library Security and Communication Networks. 16 cites.
- “One-out-of-many proofs: Or how to leak a secret and spend a coin“. J Groth, M Kohlweiss. 2015. discovery.ucl.ac.uk EUROCRYPT (2). 16 cites.
- “Post-quantum Cryptography: Code-Based Signatures.“. PL Cayrel, M Meziani. 2010. Springer AST/UCMA/ISA/ACN. 16 cites.
- “Private reputation schemes for p2p systems“. C Boyd, R Ismail, A Josang, S Russell. 2004. eprints.qut.edu.au . 16 cites.
- “Ring Signature Schemes from Lattice Basis Delegation.“. J Wang, B Sun. 2011. Springer ICICS. 16 cites.
- “Ring signatures for benzenoids with up to seven rings, Part 1: Catacondensed systems“. M Randić, AT Balaban. 2008. Wiley Online Library International Journal of Quantum …. 16 cites.
- “Ring signatures for benzenoids with up to seven rings, Part 2: Pericondensed systems“. AT Balaban, M Randić. 2008. Wiley Online Library International Journal of Quantum …. 16 cites.
- “A formal proof of security of Zhang and Kim’s ID-based ring signature scheme.“. J Herranz. 2004. sefcom.asu.edu WOSIS. 15 cites.
- “An efficient identity-based ring signature scheme and its extension“. J Zhang. 2007. Springer … Conference on Computational Science and Its …. 15 cites.
- “An identity-based proxy ring signature scheme from bilinear pairings“. W Cheng, W Lang, Z Yang, G Liu…. 2004. ieeexplore.ieee.org … 2004. Proceedings. ISCC …. 15 cites.
- “Cryptanalysis of a generalized ring signature scheme“. H Wang, F Zhang, Y Sun. 2009. ieeexplore.ieee.org IEEE Transactions on Dependable …. 15 cites.
- “Efficient attribute-based signatures for non-monotone predicates in the standard model“. T Okamoto, K Takashima. 2014. ieeexplore.ieee.org IEEE Transactions on Cloud …. 15 cites.
- “Efficient id-based threshold ring signature scheme“. J Han, X QiuLiang, C Guohua. 2008. ieeexplore.ieee.org Embedded and Ubiquitous …. 15 cites.
- “Efficient linkable and/or threshold ring signature without random oracles“. TH Yuen, JK Liu, MH Au, W Susilo…. 2012. academic.oup.com The Computer …. 15 cites.
- “Perfect concurrent signature protocol“. Z Huang, R Huang, X Lin. 2007. ieeexplore.ieee.org Software Engineering, Artificial …. 15 cites.
- “Restricted universal designated verifier signature“. X Huang, W Susilo, Y Mu, F Zhang. 2006. Springer UIC. 15 cites.
- “A promenade through the new cryptography of bilinear pairings“. X Boyen. 2006. ieeexplore.ieee.org Information Theory Workshop, 2006. ITW’06 Punta …. 14 cites.
- “Anomalous earlywood vessel lumen area in black ash (Fraxinus nigra Marsh.) tree rings as a potential indicator of forest fires“. S Kames, JC Tardif, Y Bergeron. 2011. Elsevier Dendrochronologia. 14 cites.
- “Anonymity notions for public-key infrastructures in mobile vehicular networks“. G Di Crescenzo, T Zhang…. 2007. ieeexplore.ieee.org Mobile Adhoc and …. 14 cites.
- “Baumringsignaturen und Wetteranomalien (Eichenbestand Guttenberger Forst, Klimastation Würzburg)“. B Becker, R Glaser. 1991. Springer Forstwissenschaftliches Centralblatt. 14 cites.
- “GDH group-based signature scheme with linkability“. D Zheng, VK Wei, KF Chen. 2006. IET IEE Proceedings-Communications. 14 cites.
- “Publicly Verifiable Privacy-Preserving Group Decryption.“. B Qin, Q Wu, W Susilo, Y Mu, Y Wang. 2008. Springer Inscrypt. 14 cites.
- “Spring flood reconstruction from continuous and discrete tree ring series“. É Boucher, TBMJ Ouarda, Y Bégin…. 2011. Wiley Online Library Water Resources …. 14 cites.
- “Stem analysis of a long-lived black spruce clone at treeline“. S Payette, A Delwaide, C Morneau, C Lavoie. 1994. JSTOR Arctic and Alpine Research. 14 cites.
- “A multivariate based threshold ring signature scheme“. A Petzoldt, S Bulygin, J Buchmann. 2013. Springer Applicable Algebra in Engineering …. 13 cites.
- “Convertible identity-based anonymous designated ring signatures“. Y Chen, W Susilo, Y Mu. 2006. inderscienceonline.com International Journal of Security …. 13 cites.
- “Gmatch: Secure and privacy-preserving group matching in social networks“. B Wang, B Li, H Li. 2012. ieeexplore.ieee.org Global Communications Conference …. 13 cites.
- “Location privacy in mobile computing environments“. J Baugh, J Guo. 2006. Springer Ubiquitous Intelligence and Computing. 13 cites.
- “More short signatures without random oracles.“. VK Wei, TH Yuen. 2005. pdfs.semanticscholar.org IACR Cryptology ePrint Archive. 13 cites.
- “Multi-Designated Verifiers Signatures Revisited.“. SSM Chow. 2008. pdfs.semanticscholar.org IJ Network Security. 13 cites.
- “Neutrino superbeams and the magic baseline“. A Asratyan, G Davidenko, A Dolgolenko…. 2003. arxiv.org arXiv preprint hep-ex …. 13 cites.
- “Ring signature scheme for ECC-based anonymous signcryption“. YF Chung, ZY Wu, TS Chen. 2009. Elsevier Computer Standards & Interfaces. 13 cites.
- “Step-out ring signatures“. M Klonowski, Ł Krzywiecki, M Kutyłowski…. 2008. Springer … Foundations of Computer …. 13 cites.
- “Vessel anomalies in Quercus macrocarpa tree rings associated with recent floods along the Red River of the North, United States“. EL Wertz, S St George…. 2013. Wiley Online Library Water Resources Research. 13 cites.
- “1-out-of-n signatures from a variety of keys“. M Abe, M Ohkubo, K Suzuki. 2004. search.ieice.org IEICE TRANSACTIONS on …. 12 cites.
- “A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups.“. VK Wei. 2004. pdfs.semanticscholar.org IACR Cryptology ePrint Archive. 12 cites.
- “A paleoecological analysis of the petrified trees in the Specimen Creek area of Yellowstone National Park, Montana, USA“. A Chadwick, T Yamamoto. 1984. Elsevier Palaeogeography, palaeoclimatology …. 12 cites.
- “An (n–t)-out-of-n Threshold Ring Signature Scheme“. T Isshiki, K Tanaka. 2005. Springer Australasian Conference on Information Security and …. 12 cites.
- “An efficient conditionally anonymous ring signature in the random oracle model“. S Zeng, S Jiang, Z Qin. 2012. Elsevier Theoretical Computer Science. 12 cites.
- “An efficient threshold anonymous authentication scheme for privacy-preserving communications“. J Ren, L Harn. 2013. ieeexplore.ieee.org IEEE Transactions on Wireless …. 12 cites.
- “Anonymity and application privacy in context of mobile computing in eHealth“. D Slamanig, C Stingl, C Menard…. 2008. Springer … Workshop on Mobile …. 12 cites.
- “Authenticating with Attributes.“. D Khader. 2008. eprint.iacr.org IACR Cryptology ePrint Archive. 12 cites.
- “Controllable ring signatures“. W Gao, G Wang, X Wang, D Xie. 2006. Springer WISA. 12 cites.
- “Diffraction pattern sampling for automatic pattern recognition“. G Stanley, G Lendaris. 1969. pdx.edu Soc. Photo-Opt. Instrum. Eng.. 12 cites.
- “Distributed Ring Signatures for Identity-Based Scenarios.“. J Herranz, G Sáez. 2004. eprint.iacr.org IACR Cryptology ePrint Archive. 12 cites.
- “Efficient provable certificateless blind signature scheme“. J Zhang, S Gao. 2010. ieeexplore.ieee.org Networking, Sensing and Control (ICNSC) …. 12 cites.
- “Efficient threshold signer-ambiguous signatures from variety of keys“. M Abe, M Ohkubo, K Suzuki. 2004. search.ieice.org IEICE Transactions on Fundamentals …. 12 cites.
- “Fair e-commerce protocols without a third party“. H Li, W Kou, X Du. 2006. ieeexplore.ieee.org … , 2006. ISCC’06. Proceedings. 11th IEEE …. 12 cites.
- “Hybrid optical-digital radiography-based system for lung disease detection“. RP Kruger, EL Hall, AF Turner. 1977. osapublishing.org Applied optics. 12 cites.
- “Identity-based anonymous designated ring signatures“. Y Chen, W Susilo, Y Mu. 2006. dl.acm.org … of the 2006 international conference on …. 12 cites.
- “Method and apparatus for minimizing the telephony ring voltage power supply requirements of an integrated services hub“. E Goodrich II, CL Mahaney. 2005. Google Patents US Patent 6,956,943. 12 cites.
- “Online/Offline Ring Signature Scheme.“. JK Liu, MH Au, W Susilo, J Zhou. 2009. Springer ICICS. 12 cites.
- “Security considerations in e-cognocracy“. JJ Piles, JL Salazar, J Ruíz, JM Moreno-Jiménez. 2006. Springer ISCIS. 12 cites.
- “Topics in Cryptology–CT-RSA 2006: The Cryptographers’ Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005, Proceedings“. D Pointcheval. 2005. books.google.com . 12 cites.
- “Unique ring signatures: A practical construction“. M Franklin, H Zhang. 2013. Springer … Conference on Financial Cryptography and Data …. 12 cites.
- “A multi-century tree-ring record of spring flooding on the Mississippi River“. MD Therrell, MB Bialecki. 2015. Elsevier Journal of Hydrology. 11 cites.
- “A new type of proxy ring signature scheme with revocable anonymity and no info leaked“. C Hu, P Liu, D Li. 2007. Springer Multimedia Content Analysis and Mining. 11 cites.
- “A search for cold water rings“. RE Cheney. 1981. ntrs.nasa.gov . 11 cites.
- “Access control in multi-party wireless sensor networks“. J Maerien, S Michiels, C Huygens, D Hughes…. 2013. Springer … Conference on Wireless …. 11 cites.
- “Accountable ring signatures: A smart card approach“. S Xu, M Yung. 2004. Springer Smart Card Research and Advanced Applications VI. 11 cites.
- “Ad hoc group signatures“. Q Wu, W Susilo, Y Mu, F Zhang. 2006. Springer International Workshop on Security. 11 cites.
- “Aggregating cl-signatures revisited: Extended functionality and better efficiency“. K Lee, DH Lee, M Yung. 2013. Springer … Conference on Financial Cryptography and Data …. 11 cites.
- “Anonymous Signatures Revisited.“. V Saraswat, A Yun. 2009. Springer ProvSec. 11 cites.
- “Concentric ring signature descriptor for 3d objects“. H Van Nguyen, F Porikli. 2011. ieeexplore.ieee.org Image Processing (ICIP), 2011 18th …. 11 cites.
- “Cross-identification of ring signatures in Eocene trees (Sequoia magnifica) from the Specimen Ridge locality of the Yellowstone Fossil Forests“. R Ammons, WJ Fritz, RB Ammons…. 1987. Elsevier Palaeogeography …. 11 cites.
- “Egg shell inspection using global image analysis“. YJ Han, Y Feng. 1994. elibrary.asabe.org Applied engineering in agriculture. 11 cites.
- “Event-oriented k-times revocable-iff-linked group signatures“. MH Au, W Susilo, SM Yiu. 2006. Springer … Conference on Information Security and Privacy. 11 cites.
- “Fair exchange signature schemes“. J Liu, R Sun, KS Kwak. 2010. Springer Science China Information Sciences. 11 cites.
- “Fully Structure-Preserving Signatures and Shrinking Commitments.“. M Abe, M Kohlweiss, M Ohkubo…. 2015. pdfs.semanticscholar.org IACR Cryptology …. 11 cites.
- “Identity-based chameleon hashing and signatures without key exposure“. X Chen, F Zhang, W Susilo, H Tian, J Li, K Kim. 2014. Elsevier Information Sciences. 11 cites.
- “On the security of a proxy ring signature with revocable anonymity“. J Zhang, Y Yang. 2009. ieeexplore.ieee.org … Networking and Security, 2009. MINES’09 …. 11 cites.
- “PPC: Privacy-preserving chatting in vehicular peer-to-peer networks“. X Liang, R Lu, X Lin, X Shen. 2010. ieeexplore.ieee.org … Fall (VTC 2010-Fall), 2010 IEEE …. 11 cites.
- “Providing witness anonymity in peer-to-peer systems“. B Zhu, S Setia, S Jajodia. 2006. dl.acm.org Proceedings of the 13th ACM conference on …. 11 cites.
- “Ring signature with weak linkability and its applications“. IR Jeong, JO Kwon, DH Lee. 2008. ieeexplore.ieee.org IEEE Transactions on …. 11 cites.
- “The Puzzle of the Petrified Trees“. HG Coffin. 1992. christintheclassroom.org Dialogue. 11 cites.
- “Threshold ring signature without random oracles“. TH Yuen, JK Liu, MH Au, W Susilo, J Zhou. 2011. dl.acm.org Proceedings of the 6th ACM …. 11 cites.
- “标准模型下基于双线性对的前向安全环签名方案“. 王玲玲, 张国印, 马春光. 2009. jeit.ie.ac.cn 电子与信息学报. 11 cites.
- “A New Conditionally Anonymous Ring Signature.“. S Zeng, S Jiang, Z Qin. 2011. Springer COCOON. 10 cites.
- “A new efficient optimistic fair exchange protocol without random oracles“. Q Huang, G Yang, DS Wong, W Susilo. 2012. Springer International Journal of …. 10 cites.
- “Anonymous and publicly linkable reputation systems“. J Blömer, J Juhnke, C Kolb. 2015. Springer … on Financial Cryptography and Data Security. 10 cites.
- “Cryptography and Coding“. MG Parker. 2009. Springer 12th IMA International Conference, Cryptography and …. 10 cites.
- “Efficient fair exchange from identity-based signature“. DH Yum, PJ Lee. 2008. search.ieice.org IEICE transactions on fundamentals of …. 10 cites.
- “Forward Secure Attribute-Based Signatures.“. TH Yuen, JK Liu, X Huang, MH Au, W Susilo, J Zhou. 2012. Springer ICICS. 10 cites.
- “Further observations on optimistic fair exchange protocols in the multi-user setting“. X Huang, Y Mu, W Susilo, W Wu, Y Xiang. 2010. Springer International Workshop on …. 10 cites.
- “ID-based ring authenticated encryption“. T Cao, D Lin, R Xue. 2005. ieeexplore.ieee.org … and Applications, 2005. AINA 2005. 19th …. 10 cites.
- “Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007“. J Pieprzyk, H Ghodosi, E Dawson. 2007. Springer . 10 cites.
- “Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE“. MH Au, JK Liu, W Susilo, J Zhou. 2013. ieeexplore.ieee.org IEEE Transactions on …. 10 cites.
- “Security Issues in Vehicular Ad Hoc Networks“. P Caballero-Gil. 2011. intechopen.com Mobile ad-hoc networks: applications. 10 cites.
- “Towards practical privacy-preserving digital rights management for cloud computing“. N Joshi, R Petrlic. 2013. ieeexplore.ieee.org Consumer Communications and …. 10 cites.
- “W-shaped occultation signatures: Inference of entwined particle orbits in charged planetary ringlets“. VR Eshleman, JV Breakwell, GL Tyler, EA Marouf. 1983. Elsevier Icarus. 10 cites.
- “Ad-hoc-group signatures from hijacked keypairs“. B Adida, S Hohenberger…. 2005. people.csail.mit.edu in DIMACS Workshop on …. 9 cites.
- “Anonymous communication networks: Protecting privacy on the web“. K Peng. 2014. books.google.com . 9 cites.
- “Attribute-based ring signatures (2008)“. J Li, K Kim. 2008. EPRINT http://eprint. iacr. org/2008/394. 9 cites.
- “Contribution to privacy-preserving cryptographic techniques“. MHA Au. 2009. ro.uow.edu.au . 9 cites.
- “Crypto-book: an architecture for privacy preserving online identities“. J Maheswaran, DI Wolinsky, B Ford. 2013. dl.acm.org … of the Twelfth ACM Workshop on …. 9 cites.
- “Expressive subgroup signatures“. X Boyen, C Delerablée. 2008. Springer Security and Cryptography for Networks. 9 cites.
- “Foundations of fully dynamic group signatures“. J Bootle, A Cerulli, P Chaidos, E Ghadafi…. 2016. Springer … Conference on Applied …. 9 cites.
- “Generic Constructions for Strong Designated Verifier Signature.“. D Feng, J Xu, WD Chen. 2011. pdfs.semanticscholar.org JIPS. 9 cites.
- “Highly efficient id-based ring signature from pairings“. HY Chien. 2008. ieeexplore.ieee.org Asia-Pacific Services Computing Conference, 2008 …. 9 cites.
- “ID-based deniable ring authentication with constant-size signature“. L Wang, G Zhang, C Ma. 2008. Springer Frontiers of Computer Science in China. 9 cites.
- “Identity-committable signatures and their extension to group-oriented ring signatures“. CK Chu, WG Tzeng. 2007. Springer Information Security and Privacy. 9 cites.
- “On privacy-preserving ways to porting the austrian eID system to the public cloud“. B Zwattendorfer, D Slamanig. 2013. Springer IFIP International Information Security …. 9 cites.
- “On tamper-resistance from a theoretical viewpoint“. P Mateus, S Vaudenay. 2009. Springer … Hardware and Embedded Systems-CHES 2009. 9 cites.
- “Privacy in wireless sensor networks using ring signature“. A Debnath, P Singaravelu, S Verma. 2014. Elsevier Journal of King Saud University …. 9 cites.
- “Rogue-key attacks on the multi-designated verifiers signature scheme“. KA Shim. 2008. Elsevier Information Processing Letters. 9 cites.
- “Using SEND signature algorithm agility and multiple-key CGA to secure proxy neighbor discovery and anycast addressing“. T Cheneau, M Laurent. 2011. ieeexplore.ieee.org Network and Information Systems …. 9 cites.
- “一种签名长度固定的基于身份的环签名方案“. 王玲玲, 张国印, 马春光. 2007. jeit.ie.ac.cn 电子与信息学报. 9 cites.
- “两种无证书的分布环签名方案“. 桑永宣, 曾吉文. 2008. 电子学报. 9 cites.
- “(Convertible) undeniable signatures without random oracles“. TH Yuen, MH Au, JK Liu, W Susilo. 2007. Springer International Conference on …. 8 cites.
- “A new receipt-free voting scheme based on linkable ring signature for designated verifiers“. G Chen, C Wu, W Han, X Chen…. 2008. ieeexplore.ieee.org … Software and Systems …. 8 cites.
- “A provably secure threshold ring signature scheme in certificateless cryptography“. H Wang, S Han. 2010. ieeexplore.ieee.org Information Science and Management …. 8 cites.
- “A restricted multi-show credential system and its application on e-voting“. JK Liu, DS Wong. 2005. Springer ISPEC. 8 cites.
- “A ring signature scheme based on the Nyberg-Rueppel signature scheme“. C Gao, Z Yao, L Li. 2003. Springer Applied Cryptography and Network Security. 8 cites.
- “A ring-signature anonymous authentication method based on one-way accumulator“. Z Xu, H Tian, DS Liu, J Lin. 2010. ieeexplore.ieee.org … Systems, Networks and …. 8 cites.
- “AFS: privacy-preserving public auditing with data freshness in the cloud“. P Maheswari, B Sindhumathi. 0. academia.edu … of Computer Engineering (IOSRJCE) e-ISSN. 8 cites.
- “An efficient attribute-based ring signature scheme“. W Wenqiang, C Shaozhen. 2009. ieeexplore.ieee.org Computer Science-Technology …. 8 cites.
- “Analysis of bilinear pairing-based accumulator for identity escrowing“. C Tartary, S Zhou, D Lin, H Wang, J Pieprzyk. 2008. IET IET Information Security. 8 cites.
- “Analysis of revocable-iff-linked ring signature scheme“. IR Jeong, JO Kwon, DH Lee. 2009. jstage.jst.go.jp IEICE transactions on fundamentals of …. 8 cites.
- “Anonymous authentication protocols for vehicular ad hoc networks: an overview“. H Xiong, Z Guan, J Hu, Z Chen. 2012. intechopen.com Applied Cryptography and …. 8 cites.
- “Bathymetric and oceanographic applications of Kalman filtering techniques“. R Brammer, R Pass, J White. 1983. ieeexplore.ieee.org IEEE transactions on automatic …. 8 cites.
- “Blind signature and ring signature schemes: Rehabilitation and attack“. SSM Chow. 2009. Elsevier Computer Standards & Interfaces. 8 cites.
- “Efficient authentication and key agreement protocol with anonymity for delay tolerant networks“. Y Ding, X Zhou, Z Cheng, W Zeng. 2013. Springer Wireless personal communications. 8 cites.
- “Enhancing the trust and perceived security in e-cognocracy“. J Piles, J Salazar, J Ruíz, J Moreno-Jiménez. 2007. Springer E-Voting and Identity. 8 cites.
- “Frequency domain image analysis for detecting stress cracks in corn kernels“. YJ Han, Y Feng, CL Weller. 1996. elibrary.asabe.org Applied Engineering in Agriculture. 8 cites.
- “Mesoscale variability between New York and Bermuda from repeated XBT sections and satellite altimetry“. RE Cheney, BC Douglas, E Khedouri…. 1985. journals.ametsoc.org Journal of physical …. 8 cites.
- “Mitigating phishing with ID-based online/offline authentication“. Q Ren, Y Mu, W Susilo. 2008. dl.acm.org … of the sixth Australasian conference on …. 8 cites.
- “Partial Signatures and their Applications.“. M Bellare, S Duan. 2009. ai2-s2-pdfs.s3.amazonaws.com IACR Cryptology ePrint Archive. 8 cites.
- “PBC library manual 0.5. 11“. B Lynn. 2006. crypto.stanford.edu . 8 cites.
- “Security analysis of an ultra‐lightweight RFID authentication protocol—SLMAP“. I Erguler, C Unsal, E Anarim…. 2012. Wiley Online Library Security and …. 8 cites.
- “Security approaches in e-cognocracy“. JL Salazar, JJ Piles, J Ruiz-Mas…. 2010. Elsevier Computer Standards & …. 8 cites.
- “Security Flaw of an ECC-based Signcryption Scheme with Anonymity.“. H Xiong, J Hu, Z Chen. 2013. ijns.femto.com.tw IJ Network Security. 8 cites.
- “Short accountable ring signatures based on DDH“. J Bootle, A Cerulli, P Chaidos, E Ghadafi…. 2015. Springer … on Research in …. 8 cites.
- “Signatures on a ring“. T Kanzaki. 1992. ousar.lib.okayama-u.ac.jp Mathematical Journal of Okayama University. 8 cites.
- “Strong designated verifier ID-based ring signature scheme“. W Lei, L Daxing. 2008. ieeexplore.ieee.org … Science and Engineering, 2008. ISISE’08 …. 8 cites.
- “Strong designated verifier ring signature scheme“. JS Lee, J Chang. 2007. Springer Innovations and Advanced Techniques in Computer …. 8 cites.
- “Threshold ring signature scheme based on the curve“. H Kuwakadot, H Tanakat. 2003. ipsj.ixsq.nii.ac.jp IPSJ Journal. 8 cites.
- “Two new identity-based threshold ring signature schemes“. L Deng, J Zeng. 2014. Elsevier Theoretical Computer Science. 8 cites.
- “A Framework for Unique Ring Signatures.“. MK Franklin, H Zhang. 2012. ai2-s2-pdfs.s3.amazonaws.com IACR Cryptology …. 7 cites.
- “Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting.“. CA Melchor, S Bettaieb, X Boyen, L Fousse…. 2013. books.google.com …. 7 cites.
- “An improved threshold ring signature scheme based on error correcting codes“. PL Cayrel, S El Yousfi Alaoui, G Hoffmann…. 2012. Springer Arithmetic of Finite …. 7 cites.
- “AnonRep: Towards Tracking-Resistant Anonymous Reputation.“. E Zhai, DI Wolinsky, R Chen, E Syta, C Teng, B Ford. 2016. usenix.org NSDI. 7 cites.
- “Attribute-based signatures for circuits from multilinear maps“. F Tang, H Li, B Liang. 2014. Springer International Conference on Information Security. 7 cites.
- “Attribute-based signatures with user-controlled linkability“. A El Kaafarani, L Chen, E Ghadafi…. 2014. Springer … Conference on Cryptology …. 7 cites.
- “Authenticating with attributes in online social networks“. D Cao, B Zhao, X Wang, J Su…. 2011. ieeexplore.ieee.org … Systems (NBiS), 2011 …. 7 cites.
- “Computationally sound symbolic anonymity of a ring signature“. Y Kawamoto, H Sakurada…. 2008. researchgate.net … and Issues in the Theory of …. 7 cites.
- “Efficient sanitizable signatures without random oracles“. RWF Lai, T Zhang, SSM Chow, D Schröder. 2016. Springer European Symposium on …. 7 cites.
- “Fair exchange signature schemes“. J Liu, R Sun, W Ma, Y Li, X Wang. 2008. ieeexplore.ieee.org … Information Networking and …. 7 cites.
- “Improved Threshold Ring Signature for Ad-Hoc Group“. J Xiao, G Zeng, J Liao, P Huang. 2006. ieeexplore.ieee.org … , Networking and Mobile …. 7 cites.
- “Integrity and Privacy Sustenance of Shared Large Scale Images in the Cloud by Ring Signature“. R Annamalai, J Srikanth…. 2015. search.proquest.com International Journal of …. 7 cites.
- “Introducing accountability to onion routing“. M Backes, J Clark, P Druschel, A Kate, M Simeonovski. 2013. Grande Region Security and …. 7 cites.
- “New insight to preserve online survey accuracy and privacy in big data era“. JK Liu, MH Au, X Huang, W Susilo, J Zhou…. 2014. Springer European Symposium on …. 7 cites.
- “Non-interactive conference key distribution and its applications“. R Safavi-Naini, S Jiang. 2008. dl.acm.org Proceedings of the 2008 ACM symposium on …. 7 cites.
- “Optimistic Fair Exchange of Ring Signatures.“. L Qu, G Wang, Y Mu. 2011. Springer SecureComm. 7 cites.
- “Restricted identification scheme and diffie-hellman linking problem“. M Kutyłowski, Ł Krzywiecki, P Kubiak, M Koza. 2011. Springer INTRUST. 7 cites.
- “Ring signature scheme based on multivariate public key cryptosystems“. S Wang, R Ma, Y Zhang, X Wang. 2011. Elsevier Computers & Mathematics with …. 7 cites.
- “SEFAP: An Email System for Anti-Phishing“. Q Ren, Y Mu, W Susilo. 2007. ieeexplore.ieee.org … Science, 2007. ICIS 2007. 6th IEEE …. 7 cites.
- “Shared-key signature and its application to anonymous authentication in ad hoc group“. Q Wu, X Chen, C Wang, Y Wang. 2004. Springer ISC. 7 cites.
- “Subliminal channels in the identity-based threshold ring signature“. CL Yang, CM Li, T Hwang. 2009. Taylor & Francis International Journal of Computer …. 7 cites.
- “The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity.“. R Hayashi, K Tanaka. 2005. Springer Public Key Cryptography. 7 cites.
- “UPnP and secure group communication technique for zero-configuration environment construction using incremental clustering“. PC Sethi. 2013. academia.edu International Journal of Engineering. 7 cites.
- “A note on an identity-based ring signature scheme with signer verifiability“. JY Hwang. 2011. Elsevier Theoretical Computer Science. 6 cites.
- “A provably secure proxy signature scheme from bilinear pairings“. A Wang, J Li, Z Wang. 2010. Springer Journal of Electronics (China). 6 cites.
- “Advances in Cryptology-CRYPTO 2002: 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings“. M Yung. 2002. books.google.com . 6 cites.
- “Anonymous context based role activation mechanism“. PD Chowdhury, B Christianson, J Malcolm. 2005. Springer International Workshop on …. 6 cites.
- “Confessible threshold ring signatures“. YS Chen, CL Lei, YP Chiu…. 2006. ieeexplore.ieee.org Systems and Networks …. 6 cites.
- “Cooperative influence of water binding to peptides by N H··· OH2 and C O··· HOH hydrogen bonds: Study by Ab Initio calculations“. CL Sun, CS Wang. 2012. Wiley Online Library International Journal of Quantum …. 6 cites.
- “Distributed ring signatures from general dual access structures“. J Herranz, G Sáez. 2006. Springer Designs, Codes and Cryptography. 6 cites.
- “Electronic health records: An enhanced security paradigm to preserve patient’s privacy“. D Slamanig, C Stingl. 2009. Springer International Joint Conference on Biomedical …. 6 cites.
- “Far-infrared signatures of hydrogen bonding in phenol derivatives“. DJ Bakker, A Peters, V Yatsyna…. 2016. ACS Publications The journal of …. 6 cites.
- “ID-based Proxy Ring Signature Scheme [J]“. JZ Zhang, RH Xue, LH Peng. 2011. en.cnki.com.cn Computer Engineering. 6 cites.
- “Inter device personal information transfer“. AM Olson. 2006. Google Patents US Patent 7,127,242. 6 cites.
- “Invariants for the FoCaL language“. R Rioboo. 2009. Springer Annals of Mathematics and Artificial Intelligence. 6 cites.
- “Noninteractive, anonymously authenticated, and traceable message transmission for VANETs“. MH Ibrahim. 2010. hindawi.com International Journal of Vehicular Technology. 6 cites.
- “Prototyping a lightweight trust architecture to fight phishing“. D Chau. 2005. pdfs.semanticscholar.org … And Artificial Intelligence Laboratory, Tech. Rep …. 6 cites.
- “Response of anatomical features of broadlesf tree root in karst area to soil erosion“. L Mei, WK Ke. 2011. Elsevier Procedia Engineering. 6 cites.
- “Ring proxy signatures“. B Wei, F Zhang, X Chen. 2008. Springer Journal of Electronics (China). 6 cites.
- “Saving On-Line Privacy.“. J Camenisch, G Neven. 2009. Springer PrimeLife. 6 cites.
- “Security analysis and enhancement for three‐party password‐based authenticated key exchange protocol“. J Zhao, D Gu, L Zhang. 2012. Wiley Online Library Security and Communication …. 6 cites.
- “The Solution of Safety of Electronic Cash in E-Commerce under Cloud Computing Environment“. SJ Gong, LP Zeng. 2014. Trans Tech Publ Advanced Materials Research. 6 cites.
- “Threshold ring signatures and applications to ad-hoc groups. full version“. E Bresson, J Stern, M Szydlo. 2002. cs.ucdavis.edu . 6 cites.
- “一种基于身份的代理环签名方案“. 张建中, 薛荣红, 彭丽慧. 2011. 计算机工程. 6 cites.
- “无证书盲签名方案“. 苏万力, 张跃宇, 张晓红, 王育民. 2009. tec.icbuy.com 电子科技大学学报. 6 cites.
- “无证书盲签名方案“. 苏万力, 张跃宇, 张晓红, 王育民. 2009. tec.icbuy.com 电子科技大学学报. 6 cites.
- “A collaboratively hidden location privacy scheme for VANETs“. Y Mei, G Jiang, W Zhang, Y Cui. 2014. journals.sagepub.com International Journal of …. 5 cites.
- “A general framework for group authentication and key exchange protocols“. H Yang, L Jiao, VA Oleshchuk. 2014. Springer Foundations and Practice of Security. 5 cites.
- “A multi-purpose group signature for vehicular network security“. MSI Mamun, A Miyaji, H Takada. 2014. ieeexplore.ieee.org Network-Based Information …. 5 cites.
- “A new multi-bank e-cash protocol with anonymity control“. L Wang. 2009. ieeexplore.ieee.org Information Assurance and Security, 2009. IAS’09 …. 5 cites.
- “A new type of proxy ring signature scheme with revocable anonymity“. C Hu, D Li. 2007. ieeexplore.ieee.org … , and Parallel/Distributed Computing, 2007. SNPD …. 5 cites.
- “A new yardstick for benzenoid polycyclic aromatic hydrocarbons“. M Pompe, M Randic, AT Balaban. 2008. ACS Publications The Journal of Physical …. 5 cites.
- “A novel anonymous authenticated key agreement protocol for vehicular ad hoc networks“. C Büttner, SA Huss. 2015. ieeexplore.ieee.org Information Systems Security and Privacy …. 5 cites.
- “A novel fuzzy identity-based signature with dynamic threshold“. W Chen, L Zhu, X Cao, Y Geng. 2009. ieeexplore.ieee.org Network and System Security …. 5 cites.
- “A proxy ring signature scheme with revocable anonymity from bilinear pairings“. H Wang. 2009. ieeexplore.ieee.org … Information Networking and Security, 2009. MINES’ …. 5 cites.
- “A Strong RSA-based and Certificateless-based Signature Scheme.“. CC Chang, CY Sun, SC Chang. 2016. ijns.jalaxy.com.tw IJ Network Security. 5 cites.
- “A survey of noninteractive zero knowledge proof system and its applications“. H Wu, F Wang. 2014. hindawi.com The Scientific World Journal. 5 cites.
- “A survey of ring signature“. W Lingling, Z Guoyin…. 2008. academic.hep.com.cn Frontiers of Electrical and …. 5 cites.
- “An efficient strong ID-based signature scheme with unforgeability“. J Zhang, X Liu. 2010. ieeexplore.ieee.org Frontier of Computer Science and Technology …. 5 cites.
- “Anonymous identification and designated-verifiers signatures from insecure batch verification“. SSM Chow, DS Wong. 2007. Springer EuroPKI. 5 cites.
- “Attribute-based signature scheme with constant size signature“. F Zeng, C Xu, Q Li, X Zhang. 2012. pdfs.semanticscholar.org Journal of Computational …. 5 cites.
- “Borromean ring signatures“. G Maxwell, A Poelstra. 2015. pdfs.semanticscholar.org . 5 cites.
- “Continuous earlywood vessels chronologies in floodplain ring-porous species can improve dendrohydrological reconstructions of spring high flows and flood levels“. S Kames, JC Tardif, Y Bergeron. 2016. Elsevier Journal of Hydrology. 5 cites.
- “Democratic Group Signatures with Threshold Traceability.“. D Zheng, X Li, C Ma, K Chen, J Li. 2008. eprint.iacr.org IACR Cryptology ePrint Archive. 5 cites.
- “Di-electron production in C+ C and p+ p collisions with HADES“. T Eberl. 2007. Springer The European Physical Journal C-Particles and Fields. 5 cites.
- “Efficient verifiable ring encryption for ad hoc groups“. JK Liu, PP Tsang, DS Wong. 2005. Springer European Workshop on Security in Ad-hoc …. 5 cites.
- “Energetic particle signatures of satellites and rings in Neptune’s magnetosphere“. RS Selesnick, EC Stone. 1992. Elsevier Advances in Space Research. 5 cites.
- “Generic constructions for universal designated-verifier signatures and identity-based signatures from standard signatures“. SF Shahandashti, R Safavi-Naini. 2009. IET IET Information security. 5 cites.
- “Identity-based threshold ring signature without pairings“. X Hu, Q ZhiGuang, L FaGen. 2008. ieeexplore.ieee.org Communications, Circuits and …. 5 cites.
- “Improved lattice-based threshold ring signature scheme“. S Bettaieb, J Schrek. 2013. Springer International Workshop on Post-Quantum …. 5 cites.
- “Information Security Practice and Experience“. L Zhang, Q Wu, B Qin, H Deng, J Liu…. 2014. researchgate.net … Asymmetric Group Key …. 5 cites.
- “Lattice-based multi-party concurrent signatures scheme“. S Wang, L Liu, J Chen, J Sun, X Zhang…. 2013. ieeexplore.ieee.org … (INCoS), 2013 5th …. 5 cites.
- “Lightweight anonymous authentication for ad hoc group: A ring signature approach“. X Yang, W Wu, JK Liu, X Chen. 2015. Springer International Conference on Provable …. 5 cites.
- “Linkable ring signatures from linear feedback shift register“. D Zheng, X Li, K Chen, J Li. 2007. Springer Emerging Directions in Embedded and …. 5 cites.
- “Multi-Party Concurrent Signature Scheme Based on Designated Verifiers.“. J Xushuai, Z Zhou, W Qin, Q Jiang, N Zhou. 2013. pdfs.semanticscholar.org JCP. 5 cites.
- “New definitions and designs for anonymous signatures“. M Bellare, S Duan. 2009. pdfs.semanticscholar.org Cryptology ePrint Archive, Report …. 5 cites.
- “Perfect Concurrent Signature Protocol for Symmetric Participant“. J Han, X Qiuliang, Z Bo. 2008. ieeexplore.ieee.org … Intelligence and Security, 2008. CIS’08 …. 5 cites.
- “Privacy-Preserving Digital Rights Management based on Attribute-based Encryption“. R Petrlic, C Sorge. 2014. ieeexplore.ieee.org … , Mobility and Security (NTMS), 2014 6th …. 5 cites.
- “Progress in Cryptology-INDOCRYPT 2004“. A Canteaut, K Viswanathan. 2005. Springer . 5 cites.
- “Proof-carrying proxy certificates“. W Bagga, S Crosta, R Molva. 2006. Springer SCN. 5 cites.
- “Protection of mobile agent data collection by using ring signature“. HC Lin, SM Yen, HS Chen. 2004. ieeexplore.ieee.org Networking, Sensing and Control …. 5 cites.
- “Reaction mechanism of HSH and CH3SH with NH2CH2COCH2X (X= F and Cl) molecules“. S Vijayakumar, P Kolandaivel. 2008. Wiley Online Library International Journal of …. 5 cites.
- “Related randomness attacks for public key cryptosystems“. TH Yuen, C Zhang, SSM Chow, SM Yiu. 2015. dl.acm.org Proceedings of the 10th ACM …. 5 cites.
- “Ring confidential transactions“. S Noether, A Mackenzie. 2016. ledgerjournal.org Ledger. 5 cites.
- “Ring SIgnature Confidential Transactions for Monero.“. S Noether. 2015. eprint.iacr.org IACR Cryptology ePrint Archive. 5 cites.
- “Round-Optimal Deniable Ring Authentication in the Presence of Big Brother.“. R Dowsley, G Hanaoka, H Imai, ACA Nascimento. 2010. Springer WISA. 5 cites.
- “Securization of policy making social computing. An application to e-cognocracy“. JM Moreno-Jiménez, JJ Piles, J Ruiz, JL Salazar…. 2011. Elsevier Computers in Human …. 5 cites.
- “Strong designated verifier proof signature without hash functions and the same scheme for an ad-hoc group ring“. JS Lee, JH Chang. 2006. paper.ijcsns.org International Journal of Computer Science and …. 5 cites.
- “Sub-linear blind ring signatures without random oracles“. EM Ghadafi. 2013. Springer IMA International Conference on Cryptography and …. 5 cites.
- “The Fiat-Shamir Transform for Group and Ring Signature Schemes.“. MF Lee, NP Smart, B Warinschi. 2010. Springer SCN. 5 cites.
- “The ring authenticated encryption scheme–How to provide a clue wisely“. J Lv, K Ren, X Chen, K Kim. 2009. Elsevier Information Sciences. 5 cites.
- “Theoretical computer science: essays in memory of Shimon Even“. O Goldreich, AL Rosenberg, AL Selman. 2006. Springer . 5 cites.
- “Two extensions of the ring signature scheme of Rivest–Shamir–Taumann“. Q Dong, X Li, Y Liu. 2012. Elsevier Information Sciences. 5 cites.
- “A new ring signature scheme from NTRU lattice“. C Wang, H Wang. 2012. ieeexplore.ieee.org Computational and Information Sciences …. 4 cites.
- “A new way to generate a ring: Universal ring signature“. R Tso. 2013. Elsevier Computers & Mathematics with Applications. 4 cites.
- “A Proxy Ring Signature Scheme with Revocable Anonymity Based on Bilinear Pairings“. HQ Wang. 2010. airitilibrary.com 網際網路技術學刊. 4 cites.
- “A survey on privacy preserving techniques for secure cloud storage“. S Bhagyashri, YB Gurave. 2014. academia.edu … Journal of Computer Science and Mobile …. 4 cites.
- “An efficient ID-based proxy ring signature scheme“. W Lei, L Daxing. 2009. ieeexplore.ieee.org … and Mobile Computing, 2009. CMC’09. WRI …. 4 cites.
- “An enhanced-security fair e-payment protocol“. W Fan, H Shu, E Fife, Q Yan. 2009. ieeexplore.ieee.org Computer Science and …. 4 cites.
- “An Identity-Based Ring Signature Scheme with Constant-Size Signature [J]“. WLZ Guo-yin, M Chun-guang. 2007. en.cnki.com.cn Journal of Electronics & Information …. 4 cites.
- “Anonymous proxy signature with restricted traceability“. J Wei, G Yang, Y Mu. 2014. ieeexplore.ieee.org Trust, Security and Privacy in Computing …. 4 cites.
- “Anonymous signcryption in ring signature scheme over elliptic curve cryptosystem“. YF Chung, ZY Wu, FP Lai, TS Chen. 2006. atlantis-press.com Proceedings of the 9th …. 4 cites.
- “Book Review“. L Massa. 2011. Wiley Online Library . 4 cites.
- “Certificate-based perfect concurrent signatures“. Z Huang, J Chen. 2010. ieeexplore.ieee.org Multimedia Information Networking and …. 4 cites.
- “Certificate-free ad hoc anonymous authentication“. Z Qin, H Xiong, G Zhu, Z Chen. 2014. Elsevier Information Sciences. 4 cites.
- “Certified synthesis of efficient batch verifiers“. JA Akinyele, G Barthe, B Grégoire…. 2014. ieeexplore.ieee.org … (CSF), 2014 IEEE …. 4 cites.
- “Controllable ring signatures and its application to E-prosecution“. W Gao, G Wang, X Wang, D Xie. 2013. ro.uow.edu.au . 4 cites.
- “Cryptanalysis of Attribute-based Ring Signcryption Scheme.“. H Xiong, J Geng, Z Qin, G Zhu. 2015. ijns.jalaxy.com.tw IJ Network Security. 4 cites.
- “Data and code integrity in Grid environments“. R Akimana, O Markowitch. 2006. wseas.us WSEAS International Conference on …. 4 cites.
- “Deniable key exchanges for secure messaging“. N Unger, I Goldberg. 2015. dl.acm.org Proceedings of the 22nd ACM SIGSAC …. 4 cites.
- “Efficient provable secure ID-based anonymous signcryption scheme“. J Zhang, H Chen. 2009. ieeexplore.ieee.org … and Systems, 2009. PACCS’09. Pacific …. 4 cites.
- “ID Based Signature Schemes for Electronic Voting“. T Menon, R Sindhuja. 2009. ieeexplore.ieee.org Computer and Electrical Engineering …. 4 cites.
- “Identity-based strong key-insulated ring signature scheme in the standard model“. H Wang, Y Zhang. 2011. ieeexplore.ieee.org Mobile Ad-hoc and Sensor Networks (MSN) …. 4 cites.
- “Intro to bilinear maps“. J Bethencourt. 2006. uniroma2.it … Sciences Department, Carnegie Mellon University. http …. 4 cites.
- “Investigating anonymity in group based anonymous authentication“. D Slamanig, C Stingl. 2008. Springer IFIP Summer School on the Future of Identity in the …. 4 cites.
- “Key-Homomorphic Signatures and Applications to Multiparty Signatures.“. D Derler, D Slamanig. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint Archive. 4 cites.
- “Method, apparatus, system, and program for creating ring signature“. Y Suga. 2004. Google Patents US Patent App. 10/761,697. 4 cites.
- “Multi-key leakage-resilient threshold cryptography“. C Zhang, TH Yuen, H Xiong, SSM Chow…. 2013. dl.acm.org Proceedings of the 8th …. 4 cites.
- “Non-interactive confirmer signatures“. SSM Chow, K Haralambiev. 2011. Springer Cryptographers’ Track at the RSA …. 4 cites.
- “On the definitions of anonymity for ring signatures“. M Ohkubo, M Abe. 2008. jstage.jst.go.jp IEICE transactions on fundamentals of …. 4 cites.
- “On the difficult tradeoff between security and privacy: Challenges for the management of digital identities“. D Arroyo, J Diaz, V Gayoso. 2015. Springer International Joint Conference. 4 cites.
- “On the transferability of private signatures“. J Herranz. 2009. Elsevier Information Sciences. 4 cites.
- “Policy-Controlled Signatures.“. P Thorncharoensri, W Susilo, Y Mu. 2009. Springer ICICS. 4 cites.
- “Practical Traceable Anonymous Identification.“. D Slamanig, P Schartner, C Stingl. 2009. pdfs.semanticscholar.org SECRYPT. 4 cites.
- “Privacy-preserving public auditing for secure cloud storage“. S Bhagyashri, YB Gurav. 2014. pdfs.semanticscholar.org IOSR Journal of Computer …. 4 cites.
- “Real-world evaluation of an anonymous authenticated key agreement protocol for vehicular ad-hoc networks“. C Büttner, F Bartels, SA Huss. 2015. ieeexplore.ieee.org Wireless and Mobile Computing …. 4 cites.
- “RE-NOTE: An E-voting scheme based on ring signature and clash attack protection“. H Pan, E Hou, N Ansari. 2013. ieeexplore.ieee.org Global communications conference …. 4 cites.
- “Ring signature based on ElGamal signature“. J Ren, L Harn. 2006. Springer Lecture notes in computer science. 4 cites.
- “Ring signatures: Universally composable definitions and constructions“. K Yoneyama, K Ohta. 2007. jstage.jst.go.jp Information and Media Technologies. 4 cites.
- “Scalable deniable group key establishment“. K Neupane, R Steinwandt, AS Corona. 2012. Springer International Symposium on …. 4 cites.
- “Secure and anonymous mobile ad-hoc networks“. Y Mu, F Zhang, W Susilo. 2005. ieeexplore.ieee.org Networks, 2005. Jointly held with the …. 4 cites.
- “Signature schemes using bilinear mappings“. CB Gentry. 2012. Google Patents US Patent 8,180,049. 4 cites.
- “Step-out group signatures“. M Klonowski, Ł Krzywiecki, M Kutyłowski, A Lauks. 2009. Springer Computing. 4 cites.
- “Study of in vitro mitral valve filling flow.“. T Drost, T Zimmer, HB Kim, R Shandas…. 2004. europepmc.org Biomedical sciences …. 4 cites.
- “Threshold-oriented optimistic fair exchange“. Y Wang, MH Au, JK Liu, TH Yuen, W Susilo. 2013. Springer International Conference on …. 4 cites.
- “Unconditionally secure ring authentication“. R Safavi-Naini, S Wang, Y Desmedt. 2007. dl.acm.org … of the 2nd ACM symposium on …. 4 cites.
- “一种可追踪签名者的环签密方案“. 孙庆英, 吴克力, 徐会艳. 2011. 计算机工程. 4 cites.
- “基于身份的无可信中心门限环签名方案“. 李虓, 何明星, 罗大文. 2008. 计算机工程. 4 cites.
- “A lattice-based designated verifier signature for cloud computing“. Y Zhang, Q Liu, C Tang, H Tian. 2015. inderscienceonline.com International Journal of …. 3 cites.
- “A mobile ad hoc network public key encryption algorithm based on hash-chain“. W Feng, S Qing-wei, C Ke. 2011. Elsevier Procedia Engineering. 3 cites.
- “A More Efficient Instantiation of Witness-Indistinguishable Signature.“. JK Liu, DS Wong. 2007. ijns.jalaxy.com.tw IJ Network Security. 3 cites.
- “A new improved ID-based proxy ring signature scheme from bilinear pairings“. L Weimin, Y Zongkai, C Wenqing. 2006. 万方数据资源系统 Journal of Harbin Institute of …. 3 cites.
- “A new verifiable ring signature scheme based on nyberg-rueppel scheme“. Z Changlun, L Yun, H Dequan. 2006. ieeexplore.ieee.org Signal Processing, 2006 8th …. 3 cites.
- “A novel id-based threshold ring signature scheme competent for anonymity and anti-forgery“. YF Chung, ZY Wu, TS Chen. 2006. Springer International Conference on Computational …. 3 cites.
- “A novel ring signature scheme with Multi-designated verifiers“. J Zhang, J Xie. 2008. ieeexplore.ieee.org … Intelligent Systems, 2008 IEEE Conference on. 3 cites.
- “A privacy problem on Hu–Huang’s proxy key generation protocol“. H Park, S Lim, I Yie. 2009. Elsevier Computer Standards & Interfaces. 3 cites.
- “A Provably Secure Certificate Based Ring Signature Without Pairing.“. Z Qin, H Xiong, F Li. 2014. pdfs.semanticscholar.org IJ Network Security. 3 cites.
- “A provably secure parallel certificatelesss ring signcryption scheme“. L Zhu, F Zhang, S Miao. 2010. ieeexplore.ieee.org Multimedia Information Networking …. 3 cites.
- “A Review On Multi Level Identity Based Cryptography For Secure Digital Signature Authentication“. P Sumalatha, B Sathyanarayana. 2014. ijcea.com International Journal of Computer …. 3 cites.
- “A Ring Signature Scheme with Strong Designated Verifiers to Provide Signer Anonymity“. SJ Hwang, KL Cheng. 0. Workshop on Cryptography and Information Security …. 3 cites.
- “A secure and practical approach for providing anonymity protection for trusted platforms“. K Dietrich, J Winter. 2010. Springer Information and Communications Security. 3 cites.
- “A short identity-based proxy ring signature scheme from RSA“. MR Asaar, M Salmasizadeh, W Susilo. 2015. Elsevier Computer Standards & Interfaces. 3 cites.
- “A strong designated verifier signature scheme tightly related to the LRSW assumption“. KA Shim. 2013. Taylor & Francis International Journal of Computer Mathematics. 3 cites.
- “A study on efficient group-oriented signature schemes for realistic application environment“. YF Chung, TL Chen, TS Chen…. 2012. pdfs.semanticscholar.org Int. J. Innovative …. 3 cites.
- “A survey of research on electronic auction“. X CHEN, Y WANG. 2002. en.cnki.com.cn Journal of China Institute of. 3 cites.
- “A taxonomy of ring signature schemes: Theory and applications“. H Xiong, Z Qin, F Li. 2013. Taylor & Francis IETE Journal of Research. 3 cites.
- “A viewable e-voting scheme for environments with conflict of interest“. H Li, Y Sui, W Peng, X Zou, F Li. 2013. ieeexplore.ieee.org Communications and Network …. 3 cites.
- “Access control based on group signatures in cloud service“. H Zheng, Z Zhao, X Zhang. 2012. ieeexplore.ieee.org Computer Science and Automation …. 3 cites.
- “Affiliation-hiding authenticated asymmetric group key agreement“. C Xu, Z Li, Y Mu, H Guo, T Guo. 2012. academic.oup.com The Computer Journal. 3 cites.
- “An efficient blind ring signature scheme without pairings“. J Zhang, H Chen, X Liu, C Liu. 2010. Springer International Conference on Web-Age …. 3 cites.
- “An efficient ring signature scheme from pairings“. KA Shim. 2015. Elsevier Information Sciences. 3 cites.
- “An Exploration of Group and Ring Signatures“. S Meiklejohn. 2011. academia.edu UCSD Research Exam. 3 cites.
- “Ancient oak climate proxies from the agricultural heartland“. RP Guyette, MC Stambaugh…. 2004. Wiley Online Library Eos, Transactions …. 3 cites.
- “Anonymous authentication from public-key encryption revisited“. D Slamanig. 2011. Springer Communications and Multimedia Security. 3 cites.
- “Anonymous communications in overlay networks“. J Ren, T Li, Y Li. 2008. ieeexplore.ieee.org Military Communications Conference, 2008 …. 3 cites.
- “Anonymous proof of membership with ring signature“. CC Chang, T Hwang. 2005. ieeexplore.ieee.org Electro Information Technology, 2005 …. 3 cites.
- “Assessing cryptographic signature schemes from a legal perspective“. DTF Chan, LCK Hui, SM Yiu. 2014. ieeexplore.ieee.org Privacy, Security and Trust (PST) …. 3 cites.
- “Attribute Based Signature Scheme For Attribute Based Encrypted Data In Cloud“. R Vaishnav. 2012. pdfs.semanticscholar.org International Journal of Engineering …. 3 cites.
- “Attribute-based ring signatures. ePrint, IACR“. J Li, K Kim. 0. . 3 cites.
- “Borromean ring signatures (2015)“. G Maxwell, A Poelstra. 2015. . 3 cites.
- “Breaking a certificateless strong designated verifier signature scheme“. J Zhang, J Xie. 2011. ieeexplore.ieee.org Consumer Electronics, Communications and …. 3 cites.
- “Bringing New Elements to Bitcoin with Sidechains“. G Maxwell. 2015. people.xiph.org SF Bitcoin Devs Meetup. 3 cites.
- “Certificateless ring signature based on RSA problem and DL problem“. L Deng. 2015. rairo-ita.org RAIRO-Theoretical Informatics and Applications. 3 cites.
- “Compact Confidential Transactions“. D Lukianov. 2015. voxelsoft.com . 3 cites.
- “Cryptographic mechanisms for privacy“. J Camenisch, M Dubovitskaya, M Kohlweiss…. 2011. Springer Privacy and Identity …. 3 cites.
- “Democratic group signatures with collective traceability“. X Li, D Zheng, K Chen, J Li. 2009. Elsevier Computers & Electrical Engineering. 3 cites.
- “Democratic group signatures with threshold traceability“. X Li, H Qian, J Li. 2009. Springer Journal of Shanghai Jiaotong University (Science). 3 cites.
- “Design and Analysis of” Flexible” k-out-of-n Signatures.“. R Tso, X Yi, T Ito, T Okamoto, E Okamoto. 2010. Springer ATC. 3 cites.
- “Design strategies for a privacy-friendly Austrian eID system in the public cloud“. B Zwattendorfer, D Slamanig. 2015. Elsevier Computers & Security. 3 cites.
- “Efficient spatial privacy preserving scheme for sensor network“. A Debnath, P Singaravelu, S Verma. 2013. degruyter.com Open Engineering. 3 cites.
- “Flexible multi-authority attribute-based signature schemes for expressive policy“. D Cao, B Zhao, X Wang, J Su. 2012. content.iospress.com Mobile Information Systems. 3 cites.
- “Fully deniable message authentication protocols preserving confidentiality“. L Harn, CY Lee, C Lin, CC Chang. 2011. academic.oup.com The Computer Journal. 3 cites.
- “IAA: incentive-based anonymous authentication scheme in smart grids“. Z Sui, A Alyousef, H de Meer. 2015. Springer International Conference on Internet …. 3 cites.
- “ID-based ring proxy signatures“. B Wei, F Zhang, X Chen. 2007. ieeexplore.ieee.org Information Theory, 2007. ISIT 2007 …. 3 cites.
- “Identity-based quotable ring signature“. K Wang, Y Mu, W Susilo. 2015. Elsevier Information Sciences. 3 cites.
- “Identity-based ring signature from lattice basis delegation“. J Wang. 2008. pdfs.semanticscholar.org Beijing: Tsinghua University. 3 cites.
- “IPv6 网络中的路由蠕虫传播模型倡“. 徐延贵, 钱焕延, 李华峰. 2009. arocmag.com 计算机应用研究. 3 cites.
- “Lattice-based ring signature scheme under the random oracle model“. S Wang. 2014. arxiv.org arXiv preprint arXiv:1405.3177. 3 cites.
- “Method for representing objects with concentric ring signature descriptors for detecting 3D objects in range images“. F Porikli, H Nguyen. 2012. Google Patents US Patent 8,274,508. 3 cites.
- “Multi-party concurrent signatures based on short ring signatures“. L Wang. 2010. ieeexplore.ieee.org … , Networking and Information Security (WCNIS), 2010 …. 3 cites.
- “Non-conventional Digital Signatures and Their Implementations—A Review“. D Arroyo, J Diaz, FB Rodriguez. 2015. Springer International Joint Conference. 3 cites.
- “Non-interactive deniable ring signatures“. W Susilo, Y Mu. 2003. the 6th International Conference on Information …. 3 cites.
- “On the use of key assignment schemes in authentication protocols“. J Alderman, J Crampton. 2013. Springer … Conference on Network and System Security. 3 cites.
- “Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures“. Y Wang, Q Wu, B Qin, X Chen, X Huang…. 2016. Springer Peer-to-Peer Networking …. 3 cites.
- “Preface“. H Rott, C Mätzler. 1989. Pergamon . 3 cites.
- “Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies“. M Borge, E Kokoris-Kogias, P Jovanovic…. 2017. ieeexplore.ieee.org Security and Privacy …. 3 cites.
- “Purpose-restricted anonymous mobile communications using anonymous signatures in online credential systems“. H Fathi, SH Shin, K Kobara, H Imai. 2010. Springer Wireless personal communications. 3 cites.
- “Relinkable ring signature“. K Suzuki, F Hoshino, T Kobayashi. 2009. Springer International Conference on …. 3 cites.
- “SA 3: Self-adaptive anonymous authentication for dynamic authentication policies“. Y Lian, X Huang, Y Mu. 2014. Elsevier Future Generation Computer Systems. 3 cites.
- “SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE“. DGK Kamalam, B Neka…. 2015. pdfs.semanticscholar.org International Journal of …. 3 cites.
- “Signature schemes using bilinear mappings“. CB Gentry. 2010. Google Patents US Patent 7,814,326. 3 cites.
- “Smart Card Research and Advanced Applications VI: IFIP 18th World Computer Congress TC8/WG8. 8 & TC11/WG11. 2 Sixth International Conference on …“. JJ Quisquater, P Paradinas, Y Deswarte, AA El Kalam. 2006. books.google.com . 3 cites.
- “Stretching groth-sahai: NIZK proofs of partial satisfiability“. C Ràfols. 2015. Springer Theory of Cryptography Conference. 3 cites.
- “Sub-linear Blind Ring Signatures without Random Oracles“. G ESSAM. 2013. Proceedings of the 14th IMA International Conference …. 3 cites.
- “Sub-linear size traceable ring signatures without random oracles“. E Fujisaki. 2012. search.ieice.org … on Fundamentals of Electronics, Communications and …. 3 cites.
- “Tezos: A Self-Amending Crypto-Ledger Position Paper“. LM Goodman. 2014. tezos.com . 3 cites.
- “The security and the credibility challenges in E-voting systems“. A Rana, I Zincir, S Basarici. 2015. books.google.com European Conference on Cyber …. 3 cites.
- “Threshold anonymous credential system.“. K Fung, TK Chan, JK Liu, DS Wong. 2004. researchgate.net WSEAS Transactions on …. 3 cites.
- “Towards self-organized location privacy in mobile networks“. J Freudiger, M Raya, JP Hubaux. 2008. infoscience.epfl.ch . 3 cites.
- “Unique aggregate signatures with applications to distributed verifiable random functions“. V Kuchta, M Manulis. 2013. Springer … Conference on Cryptology and Network Security. 3 cites.
- “Universal designated verifier signatures with threshold-signers“. P Thorncharoensri, W Susilo, Y Mu. 2009. Springer International Workshop on Security. 3 cites.
- “Unlinkable content playbacks in a multiparty DRM system“. R Petrlic, S Sekula. 2013. Springer IFIP Annual Conference on Data and Applications …. 3 cites.
- “A constant-size linkable ring signature scheme for e-cash protocol“. P Liu, C Hu. 2010. ieeexplore.ieee.org … Engineering and Technology (ICCET), 2010 2nd …. 2 cites.
- “A New Construction of Time Capsule Signature.“. M Zhang, G Chen, J Li, L Wang…. 2006. pdfs.semanticscholar.org IACR Cryptology …. 2 cites.
- “A new framework for conditionally anonymous ring signature“. S Zeng, S Jiang. 2013. academic.oup.com The Computer Journal. 2 cites.
- “A new ID-based ring signature scheme with constant-size signature“. C Hu, P Liu. 2010. ieeexplore.ieee.org … Engineering and Technology (ICCET), 2010 2nd …. 2 cites.
- “A new identity-based threshold ring signature scheme“. F Xu, X Lv. 2011. ieeexplore.ieee.org Systems, Man, and Cybernetics (SMC), 2011 IEEE …. 2 cites.
- “A new multivariate-based ring signature scheme“. LL Wang. 2013. Trans Tech Publ Applied Mechanics and Materials. 2 cites.
- “A note on chain reactions in traceability in cryptonote 2.0“. S Noether, A Mackenzie. 2014. bravenewcoin.com Technical report. 2 cites.
- “A Novel Id-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-Forgery“. ZY Wu, FG Jeng, TS Chen. 2006. ieeexplore.ieee.org Computational Intelligence and …. 2 cites.
- “A provably secure identity‐based proxy ring signature based on RSA“. MR Asaar, M Salmasizadeh…. 2015. Wiley Online Library Security and …. 2 cites.
- “A ring signature scheme over braid groups“. Y Wei, G Xiong, W Bao, X Zhang. 2010. Springer Journal of Electronics (China). 2 cites.
- “A Secure Publicly Verifiable Auction Scheme [J]“. C YE, M ZHANG, T WU, H DU. 2008. en.cnki.com.cn Microelectronics & Computer. 2 cites.
- “A traceable optimistic fair exchange protocol“. R Ganjavi, MR Asaar…. 2014. ieeexplore.ieee.org Information Security and …. 2 cites.
- “AATCT: Anonymously authenticated transmission on the cloud with traceability“. MH Ibrahim. 2015. researchgate.net … Journal of Advanced Computer Science & …. 2 cites.
- “An automotive distributed mobile sensor data collection with machine learning based data fusion and analysis on a central backend system“. T Tiedemann, C Backe, T Vögele, P Conradi. 2016. Elsevier Procedia Technology. 2 cites.
- “An efficient attribute-based signature scheme with claim-predicate mechanism“. C Wang, W Li. 2013. inderscienceonline.com International Journal of Grid and Utility …. 2 cites.
- “An efficient t-times proxy ring signature scheme with revocable anonymity“. J Zhang, H Chen. 2011. ieeexplore.ieee.org … Software and Networks (ICCSN), 2011 IEEE …. 2 cites.
- “An eVoting platform for QoE evaluation“. JL Tornos, JL Salazar, JJ Piles. 2013. ieeexplore.ieee.org … Network Management (IM …. 2 cites.
- “An evoting system based on ring signatures“. JL Tornos, JL Salazar, JJ Piles, J Saldana…. 2014. macrothink.org Network Protocols …. 2 cites.
- “An Improved Identity-Based Ring Signcryption Scheme“. L Deng, C Liu, X Wang. 2013. Taylor & Francis Information Security Journal: A Global …. 2 cites.
- “AN IMPROVED PROTOCOL OF ELECTRICAL AUCTION WITH SEALED BIDS [J]“. CXZFW Yumin. 2002. en.cnki.com.cn Journal of Electronics and Information Technology. 2 cites.
- “Anonymity and security in mobile Ad hoc networks“. J Bolla, V Vatsavayi, J Murthy. 2012. Springer Distributed Computing and Internet …. 2 cites.
- “Another Efficient Identity-Based Ring Signature Scheme and Its Extension“. J Zhang, J Cheng. 2007. ieeexplore.ieee.org Data, Privacy, and E-Commerce, 2007 …. 2 cites.
- “Application of herb chronology: Annual fertilization and climate reveal annual ring signatures within the roots of US tallgrass prairie plants“. JR Dee, MW Palmer. 2016. NRC Research Press Botany. 2 cites.
- “Attribute-based authentication schemes: a survey“. H Yang, V Oleshchuk. 2015. computingonline.net International Journal of Computing. 2 cites.
- “Black-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds.“. E Käsper, S Laur, H Lipmaa. 2006. eprint.iacr.org IACR Cryptology ePrint Archive. 2 cites.
- “Blind ring signatures secure under the chosen-target-CDH assumption information security“. H Javier, L Fabien. 2006. springer-verlag LNCS. 2 cites.
- “Brush scrubbing scratches reduction methods in post CMP cleaning“. H Soondrum. 2012. ma.ecsdl.org Meeting Abstracts. 2 cites.
- “Certificateless ring signature scheme from anonymous subsets“. H Wang. 2010. ieeexplore.ieee.org … Information Networking and Security (MINES), 2010 …. 2 cites.
- “Charge Fractionalization in a Mesoscopic Ring“. W DeGottardi, S Lal, S Vishveshwara. 2013. APS Physical review letters. 2 cites.
- “Cloud Data Auditing Techniques with a Focus on Privacy and Security“. M Kolhar, MM Abu-Alhaj, SMA El-atty. 2017. ieeexplore.ieee.org IEEE Security & Privacy. 2 cites.
- “Collusion-resistant convertible ring signature schemes“. JY Hwang, KY Chang, HS Cho, B Song…. 2015. Springer Science China Information …. 2 cites.
- “Computational and Symbolic Anonymity in an Unbounded Network“. H Comon-Lundh, Y Kawamoto, H Sakurada. 2009. jstage.jst.go.jp JSIAM Letters. 2 cites.
- “Concentric Ring Signature (CORS) for 3D Object Detection Recognition, and Registration“. H Van Nguyen, F Porikli. 2011. Elsevier Pattern Recognition,. 2 cites.
- “Constant size ring signature without random oracle“. P Bose, D Das, CP Rangan. 2015. Springer Australasian Conference on Information …. 2 cites.
- “Contract Net Model Based on Bit Commitment [J]“. W WAN, W SUO, Y CHEN. 2009. en.cnki.com.cn Computer Engineering. 2 cites.
- “Convertible Perfect Concurrent Signature Protocol“. H Jiang, Q Xu, C Zhang. 2010. ieeexplore.ieee.org Computational Intelligence and …. 2 cites.
- “Convertible ring signatures with gradual revelation of non‐signers“. R Tso. 2012. Wiley Online Library Security and Communication Networks. 2 cites.
- “Cryptanalysis and improvement of a concurrent signature scheme based on identity“. Z Zhang, S Xu. 2011. ieeexplore.ieee.org … and Service Science (ICSESS), 2011 IEEE …. 2 cites.
- “Cryptanalysis and improvement of a ring signature based on ElGamal signature“. H Wang, S Han, C Deng…. 2009. ieeexplore.ieee.org … Engineering, 2009. WCSE’ …. 2 cites.
- “Cryptanalysis of several linkable ring signature schemes“. H Wang, S Zhao. 2010. ieeexplore.ieee.org Networks Security Wireless Communications …. 2 cites.
- “Crypto-Book: Bootstrapping Privacy Preserving Online Identities from Social Networks“. J Maheswaran, D Jackowitz, DI Wolinsky…. 2014. arxiv.org arXiv preprint arXiv …. 2 cites.
- “Data Sharing in Cloud Using Identity Based Ring Signature“. N Shirsath Priyanka, K BECOMP. 2015. irjet.net International Research Journal of …. 2 cites.
- “Decentralized access control with Anonymous authentication of data stored in cloud“. CMSR Krishna, GJ Samuel. 2016. ijitech.org . 2 cites.
- “Design and Evaluation for a Multi-Cloud Based Storage System with Privacy Preserving“. Y Fan, Z Qiao, M Xiao. 2014. ieeexplore.ieee.org … , and Storage (NAS), 2014 9th IEEE …. 2 cites.
- “Distributed anonymized communications“. R Hodgman, ME Van Dijk, E Kolman. 2015. Google Patents US Patent 9,015,231. 2 cites.
- “Efficient and random oracle-free conditionally anonymous ring signature“. S Zeng, Z Qin, Q Lu, Q Li. 2012. Springer International Conference on Provable Security. 2 cites.
- “English Auction Protocol Based on Ring Signatures [J]“. WU Ke-li. 2006. en.cnki.com.cn Computer Engineering and Applications. 2 cites.
- “Escrowed linkability of ring signatures and its applications. VIETCRYPT 2006, LNCS vol. 4341“. S Chow, W Susilo, TH Yuen. 2006. Springer . 2 cites.
- “Fast object recognition using a hybrid optical/digital processor.“. DJF Walker, CR Chatwin. 1990. pdfs.semanticscholar.org BMVC. 2 cites.
- “Forward-secure traceable ring signature“. C Hu, D Li. 2007. ieeexplore.ieee.org … , and Parallel/Distributed Computing, 2007. SNPD …. 2 cites.
- “Generation and Tate pairing computation of ordinary elliptic curves with embedding degree one“. Z Hu, L Wang, M Xu, G Zhang. 2013. Springer International Conference on Information …. 2 cites.
- “Group signature with deniability: how to disavow a signature“. A Ishida, K Emura, G Hanaoka, Y Sakai…. 2017. search.ieice.org … on Fundamentals of …. 2 cites.
- “ID-based ring signatures for general families of signing subsets“. J Herranz, G Sáez. 2005. Submitted . 2 cites.
- “ID-based Threshold Ring Signature Scheme Without Trusted Party [J]“. X LI, M HE, D LUO. 2008. en.cnki.com.cn Computer Engineering. 2 cites.
- “Identity-based directed proxy ring signature scheme“. KA Ajmath, PV Reddy, BU Rao…. 2012. Taylor & Francis Journal of Discrete …. 2 cites.
- “Identity-Based Ring Signatures fromRSA“. I Javier Herranz. 0. Artificial Intelligence Research Institute, CSIC, Spanish …. 2 cites.
- “Identity-based threshold ring signcryption from pairing“. L Deng, S Li, Y Yu. 2014. inderscienceonline.com International Journal of Electronic …. 2 cites.
- “J. stern, M. Szydlo, Threshold Ring Signatures and Applications to Ad-hoc Groups, LNCS, CRYTO 2002“. E Bresson. 2002. Berlin: Springer-Verlag . 2 cites.
- “Key Agreement from Signatures: Improved Protocols and Anonymous Extension“. S Chow, KK Choo. 2007. researchgate.net . 2 cites.
- “Laribus: privacy-preserving detection of fake SSL certificates with a social P2P notary network“. A Micheloni, KP Fuchs, D Herrmann…. 2013. ieeexplore.ieee.org … and Security (ARES) …. 2 cites.
- “Linkable and culpable ring signatures“. JK Liu, VK Wei, DS Wong. 2003. Manuscript . 2 cites.
- “Logarithmic size ring signatures without random oracles“. C Gritti, W Susilo, T Plantard. 2016. IET IET Information Security. 2 cites.
- “Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin.“. T Ruffing, P Moreno-Sanchez. 2017. fc17.ifca.ai IACR Cryptology ePrint Archive. 2 cites.
- “New Distributed Ring Signatures for General Families of Signing Subsets.“. J Herranz, G Sáez. 2004. eprint.iacr.org IACR Cryptology ePrint Archive. 2 cites.
- “Non‐interactive deniable ring signature without random oracles“. S Zeng, Q Li, Z Qin, Q Lu. 2016. Wiley Online Library Security and Communication …. 2 cites.
- “Non‐interactive deniable ring signature without random oracles“. S Zeng, Q Li, Z Qin, Q Lu. 2016. Wiley Online Library Security and Communication …. 2 cites.
- “On Privacy and Integrity in Vehicular Ad hoc Networks.“. P Caballero-Gil, C Caballero-Gil, J Molina-Gil…. 2010. researchgate.net ICWN. 2 cites.
- “On Privacy Losses in the Trusted Agent Model“. P Mateus, S Vaudenay. 2009. infoscience.epfl.ch EUROCRYPT” 09. 2 cites.
- “Online/Off-line Ring Signature Scheme with Provable Security.“. J Kar. 2015. eprint.iacr.org ISI. 2 cites.
- “PPAA: Peer-to-peer anonymous authentication (extended version)“. PP Tsang, SW Smith. 2008. pdfs.semanticscholar.org . 2 cites.
- “Privacy in Mobile Ad Hoc Networks“. BJ Vazram, VV Kumari, JVR Murthy. 2011. Springer Advances in Digital Image …. 2 cites.
- “Progress in Cryptology-VIETCRYPT 2006“. PQ Nguyen. 2006. Springer . 2 cites.
- “Proof of signer and privacy revocation in ring signatures“. H Kikuchi. 2003. ci.nii.ac.jp 4th International Workshop on Information Security …. 2 cites.
- “Public audit of cloud shared data by using efficient privacy preserving scheme“. F Malugu, KS Babu. 2015. ijser.in Journal of Scientific Engineering and Research. 2 cites.
- “Relaxed security notions for signatures of knowledge“. M Fischlin, C Onete. 2011. Springer … Conference on Applied Cryptography and Network …. 2 cites.
- “Review of CryptoNote white paper“. S Noether. 2014. bravenewcoin.com … http://monero. cc/downloads/whitepaper_review. pdf …. 2 cites.
- “Ring group signatures“. L Chen. 2012. ieeexplore.ieee.org Trust, Security and Privacy in Computing and …. 2 cites.
- “Scheme on user identity attribute preserving based on ring signcryption for cloud computing“. L Shuan-bao, F Jian-ming, Z Huan-guo…. 2014. chinacloud.cn Journal on …. 2 cites.
- “Secure anonymously authenticated and traceable enterprise DRM system“. MH Ibrahim. 2015. search.proquest.com International Journal of Computer Applications. 2 cites.
- “Self-certified ring signatures“. N Li, Y Mu, W Susilo, F Guo. 2011. dl.acm.org Proceedings of the 6th ACM Symposium …. 2 cites.
- “Self-proved ring signatures and Ring Sign-Cryption Algorithm in Mobile ad hoc network [D]“. F You-miao. 2005. He Fei: University of science and technology of China …. 2 cites.
- “Separable identity-based deniable authentication: cryptographic primitive for fighting phishing“. W Susilo, Y Mu. 2006. Springer European Public Key Infrastructure Workshop. 2 cites.
- “Short (resp. Fast) CCA2-Fully-Anonymous Group Signatures using IND-CPA-Encrypted Escrows.“. VK Wei. 2005. pdfs.semanticscholar.org IACR Cryptology ePrint Archive. 2 cites.
- “Short linkable ring signatures f0r E—voting, E cash and attestation“. PP Tsang, VK Wei. 0. Pine. First lnfor—marion Security Practice and …. 2 cites.
- “Signer-traceable Ring Signcryption Scheme [J]“. QY Sun, KL Wu, HY Xu. 2011. en.cnki.com.cn Computer Engineering. 2 cites.
- “Study on ring signature and its application“. X Zhou. 2009. ieeexplore.ieee.org Control and Decision Conference, 2009. CCDC’09 …. 2 cites.
- “Survey on privacy preserving public auditing techniques for shared data in the cloud“. KJ Rasal, DSV Gumaste, SA Kahate. 2015. ijesit.com Journal of Engineering Science and …. 2 cites.
- “The Degree of Privacy in Web-based Electronic Health Records“. D Slamanig, C Stingl. 2009. Springer 4th European Conference of the International …. 2 cites.
- “The Yellowstone Petrified Forests“. JD Morris. 1995. slservicios.com . 2 cites.
- “Threshold ring signatures for ad-hoc groups, Crypto’02, LNCS 2442“. E Bresson, J Stem, M Szydlo. 2002. Springer-Verlag . 2 cites.
- “Toward the fair anonymous signatures: deniable ring signatures“. Y Komano, K Ohta, A Shimbo…. 2007. search.ieice.org IEICE Transactions on …. 2 cites.
- “Towards Unconditional Anonymity: Privacy Enforcement Model in Web Services“. Y Yang, J Yang. 2008. ieeexplore.ieee.org Congress on Services Part II, 2008 …. 2 cites.
- “Two Stories of Ring Signatures. Crypto 2005 rump session talk“. Y Hanatani, K Ohta. 2005. . 2 cites.
- “Uncorrelatable electronic transactions using ring signatures“. PD Chowdhury, B Christianson. 2004. researchgate.net Proceedings of the Wholes …. 2 cites.
- “Using resultants for SAGBI basis verification in the univariate polynomial ring“. A Torstensson, V Ufnarovski, H Öfverbeck. 2005. Elsevier Journal of Symbolic …. 2 cites.
- “唱 16.[12] CHOW S SM, WEI UK, LIU JK, et al“. 唱VerlagSpringer. 0. Ring signatures without ran 唱, 1. 2 cites.
- “基于环 Zn 上圆锥曲线的前向安全环签名方案“. 王玲玲, 张国印, 马春光. 2008. 计算机工程. 2 cites.
- “基于身份的可链接和可转换环签名“. 王少辉, 郑世慧, 展涛. 2008. jeit.ie.ac.cn 电子与信息学报. 2 cites.
- “基于身份的可链接和可转换环签名“. 王少辉, 郑世慧, 展涛. 2008. jeit.ie.ac.cn 电子与信息学报. 2 cites.
- “改进的标准模型下的基于身份的环签名方案倡“. 程文华, 王彩芬, 韩亚宁, 张玉磊. 2009. arocmag.com 计算机应用研究. 2 cites.
- “(Strong) multidesignated verifiers signatures secure against rogue key attack“. MH Au, G Yang, W Susilo…. 2014. Wiley Online Library … and Computation: Practice …. 1 cites.
- “A dendrochronological assessment of two tree species to reconstruct climate on the Fraser Plateau, British Columbia“. Z Gedalof, R Au, B Blundon, G Carnwath…. 2008. researchgate.net Report on the 18th …. 1 cites.
- “A Forward-secure Anonymity Signature Scheme Based on Ring Signature Idea [J]“. ZZMAO Ming. 2010. en.cnki.com.cn Microcomputer Information. 1 cites.
- “A linkable and convertible ID-based ring signature“. X Shen, M Xu, Y Zhao. 2011. ieeexplore.ieee.org Computational and Information …. 1 cites.
- “A new identity-based ring signcryption scheme“. L Deng, J Zeng, S Li. 2014. inderscienceonline.com International Journal of Electronic …. 1 cites.
- “A Note on Shacham and Waters Ring Signatures“. P Wei, M Wang, W Wang. 2007. ieeexplore.ieee.org Computational Intelligence and …. 1 cites.
- “A Privacy Preserving of Composite Private/Public Key in Cloud Servers“. OS Nagesh. 2014. ijcttjournal.org International Journal of Computer Trends and …. 1 cites.
- “A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience.“. H Wang, Q Wu, B Qin, F Zhang, J Domingo-Ferrer. 2014. books.google.com ISPEC. 1 cites.
- “A reputation system supporting unlinkable, yet authorized expert ratings“. A Kokoschka, R Petrlic, C Sorge. 2015. dl.acm.org Proceedings of the 30th Annual ACM …. 1 cites.
- “A Review on Implementation of Message Authentication Scheme for Elliptic Curve Cryptography in Wireless Sensor Networks“. M Ghonge, MS Kale. 2016. ijsrset.com International Journal of Scientific Research in …. 1 cites.
- “A Scheme of Electronic Auction Based on Ring Signature [J]“. W Xiao-ming. 2011. en.cnki.com.cn Computer Knowledge and Technology. 1 cites.
- “A Strong Designated Verifier Ring Signcryption Scheme Providing Strongest Signers’ Anonymity.“. SJ Hwang, JY Chen. 2014. pdfs.semanticscholar.org J. Inf. Sci. Eng.. 1 cites.
- “A Strong Designated-Verifier Ring Signature Scheme Providing One-Out-of-All Signer Anonymity“. SJ Hwang, KL Cheng. 2011. airitilibrary.com 網際網路技術學刊. 1 cites.
- “A Strong Designated-Verifier Ring Signature Scheme Providing One-Out-of-All Signer Anonymity“. SJ Hwang, KL Cheng. 2011. airitilibrary.com 網際網路技術學刊. 1 cites.
- “A survey of ring signature“. LWGZ Chunguang. 0. 万方数据资源系统. 1 cites.
- “An attribute-based anonymous authentication scheme“. W Hongbin, R Yan. 2013. ieeexplore.ieee.org Emerging Intelligent Data and Web …. 1 cites.
- “An attribute-based ring signature scheme in lattice“. W Li, M Fan, Z Jia. 2012. Springer Wuhan University Journal of Natural Sciences. 1 cites.
- “An Efficient Anonymous Authenticated Key Agreement Protocol for Vehicular Ad-Hoc Networks Based on Ring Signatures and the Elliptic Curve Integrated Encryption …“. C Büttner, SA Huss. 2015. Springer … Conference on Information Systems Security and …. 1 cites.
- “An efficient certificateless ring signature scheme“. L Zhu, F Zhang. 2008. Springer Wuhan University Journal of Natural Sciences. 1 cites.
- “An improved ring signature scheme without trusted key generation center for wireless sensor network“. J Xiao, G Zeng. 2009. Springer Journal of Shanghai Jiaotong University (Science). 1 cites.
- “An investigation into Confidential Transactions.“. A Gibson. 2016. pdfs.semanticscholar.org h ttps://github. com/AdamISZ …. 1 cites.
- “Analysis and Improvement of Ring Signature Scheme Based on Quadratic Residues“. F WANG, L WEI, W GAO. 2012. en.cnki.com.cn Journal of Jiamusi University (Natural …. 1 cites.
- “Analysis and Improvement of Ring Signature Scheme Based on Quadratic Residues“. F WANG, L WEI, W GAO. 2012. en.cnki.com.cn Journal of Jiamusi University (Natural …. 1 cites.
- “Analysis on the t-out-of-n Ring Signatures from Discrete Logarithm Public Keys“. J Shang, Q Xu, H Jiang. 2006. GAI-KAN BIAJIBU MINIMICRO SYSTEMS-SHENYANG-. 1 cites.
- “Anonymity-preserving identity-based multisignature scheme with provision for origin Self-Revelation“. W Goh, CK Yeo. 2013. ieeexplore.ieee.org Global Communications Conference …. 1 cites.
- “Anonymizable signature and its construction from pairings“. F Hoshino, T Kobayashi, K Suzuki. 2010. Springer International Conference on Pairing …. 1 cites.
- “Anonymous Communication Protocol in Overlay Networks“. J Ren, T Li, K Han. 2008. ieeexplore.ieee.org … . ICC’08. IEEE International Conference on. 1 cites.
- “Anonymous evaluation system“. K Kluczniak, L Hanzlik, P Kubiak…. 2015. Springer … Conference on Network …. 1 cites.
- “Applications of pairings in grid security“. A Saxena, B Soh. 2006. ieeexplore.ieee.org Communication System Software and …. 1 cites.
- “Attribute-based ring signatures: Security analysis and a new construction“. R Toluee, MR Asaar…. 2013. ieeexplore.ieee.org Information Security and …. 1 cites.
- “Breaking a proxy ring signature with revocable anonymity in MINE2009“. J Zhang, H Chen. 2010. ieeexplore.ieee.org … and Digital Society (ICNDS), 2010 2nd …. 1 cites.
- “Building privacy-preserving cryptographic credentials from federated online identities“. J Maheswaran, D Jackowitz, E Zhai…. 2016. dl.acm.org Proceedings of the …. 1 cites.
- “Certificateless Ring Signature Scheme without Pairing [J]“. T YU, Z ZHAO, X REN. 2012. en.cnki.com.cn Journal of Hangzhou Dianzi University. 1 cites.
- “Concurrent Signatures without a Conventional Keystone“. Y Mu, D Wong, L Chen, W Susilo…. 2008. books.google.com Proceedings of the First …. 1 cites.
- “Contributions of dendrochronology to flood hazard analysis in the Red River Basin, Manitoba“. SS George, E Nielsen. 0. manitoba.ca. 1 cites.
- “Cramer–Damgård signatures revisited: Efficient flat-tree signatures based on factoring“. D Catalano, R Gennaro. 2007. Elsevier Theoretical computer science. 1 cites.
- “Cryptographic privacy enhancing technologies“. LD Nguyen. 2005. ro.uow.edu.au . 1 cites.
- “Dendrochronology of submerged Bulgarian sites“. PI Kuniholm, MW Newton, B Kromer. 2007. Springer The Black Sea Flood Question …. 1 cites.
- “Dual Construction of Stern-based Signature Schemes“. PL Cayrel, SMEY Alaoui. 2010. tk.informatik.tu-darmstadt.de World Academy of Science …. 1 cites.
- “Efficient Light-weight Proxy Ring Signature Scheme For VANETs“. J Zhang, L Liu, M Xu, Y Cui. 2012. Advanced Institutes of Convergence … International …. 1 cites.
- “Efficient linkable ring signatures and threshold signatures from linear feedback shift register“. X Li, D Zheng, K Chen. 2007. Springer … Conference on Algorithms and Architectures for …. 1 cites.
- “Efficient Multivariate Ring Signature Schemes.“. MSE Mohamed, A Petzoldt. 2017. eprint.iacr.org IACR Cryptology ePrint Archive. 1 cites.
- “Efficient ring signature schemes over NTRU Lattices“. YH Zhang, Y Hu, J Xie, M Jiang. 2016. Wiley Online Library Security and Communication …. 1 cites.
- “Efficient ways of prime number generation for ring signatures“. JL Salazar, JL Tornos, JJ Piles. 2016. IET IET Information Security. 1 cites.
- “Enhanced Ring Signatures Schemes for Privacy Preservation in Wireless Sensor Networks“. S Mishra, M Pandey. 2014. search.proquest.com International Journal of Modern …. 1 cites.
- “Financial Cryptography and Data Security: 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers“. AR Sadeghi. 2013. books.google.com . 1 cites.
- “Forcing out a confession: Threshold discernible ring signatures“. S Kumar, S Agrawal, R Venkatesan…. 2010. ieeexplore.ieee.org … ), Proceedings of the …. 1 cites.
- “Forking lemmas in the ring signatures’ seena—rio“. J Herranz, G Sáez. 0. eprint.iacr.org 2003—04—10. 1 cites.
- “Forward secure identity based ring signature scheme for images“. SN Saranya, P Thilagavathi, M Tharani. 2015. Citeseer Int. J. Adv. Info. Comm. Tech.. 1 cites.
- “Hard invalidation of electronic signatures“. L Hanzlik, M Kutyłowski, M Yung. 2015. Springer Information Security Practice and …. 1 cites.
- “Hierarchical ring signatures“. L Krzywiecki, M Kutylowski…. 2009. kutylowski.im.pwr.wroc.pl Slides presented at’ …. 1 cites.
- “How to Leak a Secret and Reap the Rewards too“. V Saraswat, SK Pandey. 2014. Springer … on Cryptology and Information Security in Latin …. 1 cites.
- “Identity Based Proxy Signature from RSA without Pairings.“. L Deng, H Huang, Y Qu. 2017. pdfs.semanticscholar.org IJ Network Security. 1 cites.
- “Improved blind signature schemes based on XTR system [J]“. X DING, Z FU, S ZHANG. 2008. en.cnki.com.cn Journal of Computer Applications. 1 cites.
- “Improved ID-based ring signature scheme with constant-size signatures“. H Li, X Li, M He, S Zeng. 2011. informatica.si Informatica. 1 cites.
- “Improved lattice-based ring signature schemes from basis delegation“. G Wen, H Yupu, W Baocang, X Jia. 2016. Elsevier The Journal of China Universities of …. 1 cites.
- “Improving Obfuscation in the CryptoNote Protocol“. A Mackenzie, S Noether, MC Team. 2015. bravenewcoin.com . 1 cites.
- “Information Security Practice and Experience: 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings“. X Huang, J Zhou. 2014. books.google.com . 1 cites.
- “Information Security: 9th International Conference; ISC 2006, Samos Island, Greece, August 30-September 2, 2006, Proceedings“. SK Katsikas, M Backes, S Gritzalis, B Preneel. 2006. books.google.com . 1 cites.
- “Legally fair contract signing without keystones“. H Ferradi, R Géraud, D Maimuț, D Naccache…. 2016. Springer … Conference on Applied …. 1 cites.
- “Limited-linkable Group Signatures with Distributed-Trust Traceability“. C Hlauschek, J Black, G Vigna, C Kruegel. 2012. researchgate.net . 1 cites.
- “Maintaining unlinkability in group based P2P environments“. J Arnedo-Moreno…. 2009. ieeexplore.ieee.org … , 2009. WETICE’09. 18th …. 1 cites.
- “Monero is Not That Mysterious“. S Noether, S Noether. 2014. lab.getmonero.org . 1 cites.
- “Multi authority attribute based encryption against data integrity and scalability issues in cloud data services“. A Praveena, C Sasikala. 2015. ieeexplore.ieee.org Innovations in Information …. 1 cites.
- “Multi-ring signatures of the oscillation in a water Cherenkov detector“. AE Asratyan, GV Davidenko, AG Dolgolenko…. 2003. Springer The European Physical …. 1 cites.
- “New Certificateless Blind Ring Signature Scheme“. H Sun. 2014. iaescore.com Indonesian Journal of Electrical Engineering and …. 1 cites.
- “Nonlinear blind channel equalization via ring decision feedback“. BP Paris, H Chen. 1998. ieeexplore.ieee.org Information Theory, 1998. Proceedings …. 1 cites.
- “Notions of Deniable Message Authentication“. M Fischlin, S Mazaheri. 2015. dl.acm.org Proceedings of the 14th ACM Workshop on …. 1 cites.
- “On Secure Group Admission Control Using ICMetrics“. H Tahir, G Howells, H Hu, D Gu…. 2014. ieeexplore.ieee.org … (EST), 2014 Fifth …. 1 cites.
- “On the Security of a Lattice-Based Multi-party Concurrent Signature Scheme“. X Mao, K Chen, L Wang, Y Long. 2014. ieeexplore.ieee.org Intelligent Networking and …. 1 cites.
- “On the security of an enhanced ID-based anonymous proxy signature scheme in ICCAE2010“. J Zhang, Y Xu. 2012. ieeexplore.ieee.org … and Collaborative Systems (INCoS), 2012 4th …. 1 cites.
- “One-time zero sum ring signature“. C Fromknecht. 2016. scalingbitcoin.org . 1 cites.
- “Optimized coke cutting method for decoking substantially free-flowing coke in delayed cokers“. GE Phillips, CJ Mart. 2010. Google Patents US Patent 7,815,775. 1 cites.
- “Periodic Updation in TPA for Secure Dynamic Audit Services of Outsourced Storages in Clouds“. NS Priya. 2015. jncet.org Journal of Network Communications and Emerging …. 1 cites.
- “POSTER: Deniable Anonymous Group Authentication“. E Syta, B Ford. 2013. ieee-security.org Proceedings of the IEEE Symposium on Security …. 1 cites.
- “Privacy-preserving PKIs with reduced server trust“. G Di Crescenzo, T Zhang. 2012. ieeexplore.ieee.org Communications (ICC), 2012 IEEE …. 1 cites.
- “Reconstruction of debris-flow dynamics and triggers since AD 1570–Looking back to a decade of tree-ring research at Ritigraben (Valais, Switzerland) …“. M Stoffel. 2011. ijege.uniroma1.it 5th International Conference on Debris-Flow Hazards …. 1 cites.
- “Remote Attestation on Trusted Cloud Computing“. BL Yang, H Guo. 2015. Trans Tech Publ Applied Mechanics and Materials. 1 cites.
- “Research and implementation of highly-efficient anonymous electronic voting scheme based on ring signature and blind signature“. Y Yaojun, H Haiyan. 2012. ieeexplore.ieee.org World Automation Congress (WAC) …. 1 cites.
- “Ring signature with divided private key.“. S Flonta, LC Miclea. 2010. eprint.iacr.org IACR Cryptology ePrint Archive. 1 cites.
- “Ring Signature with Weak Linkability and its Application“. I Rae, J Ok, D Hoon. 0. IEEE Trans. 1 cites.
- “Ring signatures based homomorphic authentication for public auditing in Cloud“. P Rahul, T Malathi, S Archana. 2015. ijraet.com Advanced Engineering Technologies. 1 cites.
- “Schnorr ring signature scheme with designated revocability“. X Lv, Z Wang, F Qian, F Xu. 2012. Taylor & Francis Intelligent Automation & Soft …. 1 cites.
- “Secure efficient history-hiding append-only signatures in the standard model“. B Libert, M Joye, M Yung, T Peters. 2015. Springer IACR International Workshop on …. 1 cites.
- “Security technologies and applications for convergence environments“. JJ Park, SJ Wang, D Sauveron. 2012. Wiley Online Library Security and Communication …. 1 cites.
- “Self-certified digital signatures“. N Li. 2011. ro.uow.edu.au . 1 cites.
- “Signatures for Multi-source Network Coding“. Y Mingxi, L Jiao, L Layuan. 2010. … NO 13 WEST CHANG AN AVENUE … China …. 1 cites.
- “Survey on Privacy Preserving Public Auditing for Shared Data in Cloud“. P Kapadne. 2015. pnrsolution.org . 1 cites.
- “The Evolution of Self-Organized Privacy“. J Freudiger. 2008. EPFL . 1 cites.
- “Threshold discernible ring signatures“. S Kumar, S Agrawal, R Venkatesan, SV Lokam…. 2010. Springer ICETE. 1 cites.
- “Threshold Ring Signatures Efficient for Large Sets of Signers.“. K Maneva-Jakimoska, G Jakimoski…. 2005. eprint.iacr.org IACR Cryptology ePrint …. 1 cites.
- “Two-Party (Blind) Ring Signatures and Their Applications.“. MH Au, W Susilo. 2014. books.google.com ISPEC. 1 cites.
- “リング署名における署名者の証明と匿名性破棄プロトコル“. 菊池浩明, 多田美奈子, 中西祥八郎. 2004. ipsj.ixsq.nii.ac.jp 情報処理学会論文誌. 1 cites.
- “リング署名プロトコルにおける署名者開示“. 菊池浩明, 多田美奈子, 中西祥八郎. 2003. ipsj.ixsq.nii.ac.jp 情報処理学会研究報告 …. 1 cites.
- “基于有限惩罚建立无线自组网的激励机制倡“. 魏华, 孙浩, 周雪梅. 2009. arocmag.com 计算机应用研究. 1 cites.
- “(Hierarchical Identity-Based) Threshold Ring Signatures.“. VK Wei, TH Yuen. 2006. IACR Cryptology ePrint Archive. 0 cites.
- “… Certification after RegistrationUndeniable and Unpretendable SignaturesSub-Linear Size Traceable Ring Signatures without Random OraclesAn Efficient …“. J RYU. 0. search.ieice.org. 0 cites.
- “… Certification after RegistrationUndeniable and Unpretendable SignaturesSub-Linear Size Traceable Ring Signatures without Random OraclesAn Efficient …“. J RYU. 0. search.ieice.org. 0 cites.
- “… Ring-Signaturen für die Car2X-Kommunikation unter Verwendung von sicherem Speicher: Implementation of ring signatures for Car2X-Communication …“. J Wagener. 2014. . 0 cites.
- “2008 Index IEEE Transactions on Dependable and Secure Computing Vol. 5“. S Bagchi, E Bertino, B Blanchet, D Brumley…. 2008. Computer networks. 0 cites.
- “A chronology of climatic downturns through the mid-and late-Holocene: tracing the distant effects of explosive eruptions from palaeoclimatic and historical …“. J Holopainen, M Macias-Fauria, M Timonen…. 2013. Co-Action Publishing . 0 cites.
- “A Forward Secure Ring Signature Scheme“. B Wansu, W Yun. 2008. ieeexplore.ieee.org Intelligent Information Hiding and Multimedia …. 0 cites.
- “A LITERATURE SURVEY ON A NOVEL PRIVACY PRESERVING PUBLIC AUDITING MECHANISM ON SHARED CLOUD DATA USING ORUTA“. MA Priyanga, PDRV Kumar. 0. ijarece.org. 0 cites.
- “A LITERATURE SURVEY ON SECURITY BASED FORWARD RING SIGNATURE SCHEME USING IDENTITY INFORMATION“. V Dhinakari, R NallaKumar, LS Santhoshkumar. 0. ijcrcst.com. 0 cites.
- “A New Aggregate Signature Scheme in Cryptographic Currency“. C Yuan, M Xu, X Si. 0. ijpe-online.com International Journal of Performability Engineering. 0 cites.
- “A New Approach to Threshold Attribute Based Signatures“. SSD Selvi, S Venugopalan, CP Rangan. 0. pdfs.semanticscholar.org. 0 cites.
- “A new certificateless self-identifiable ring signature scheme“. Y Sang, L You. 2010. ieeexplore.ieee.org … Engineering and Informatics (BMEI), 2010 3rd …. 0 cites.
- “A New Multivariate-based Ring Signature Scheme“. L ling Wang. 2013. atlantis-press.com . 0 cites.
- “A New Ring Signature Scheme with Multiple Functions“. J He, B Liu. 2012. dianzikeji.org Dianzi Keji- Electronic Science and Technology. 0 cites.
- “A New SDV Anonymous Proxy Signature Scheme“. X Wang. 2010. ieeexplore.ieee.org Computational Aspects of Social Networks (CASoN) …. 0 cites.
- “A Novel Approach for Auditing for Data in the Cloud by Using Privacy-Preserving Techniques“. B Ravikumar, P Venuthurumilli. 2015. International Journal of Research. 0 cites.
- “A Novel Method for Blocking Misbehaving Users over Anonymizing Networks“. ANVK Gopichand, SG Gouse. 0. pdfs.semanticscholar.org. 0 cites.
- “A Privacy Preserving Techniques to Improve Privacy and Efficiency of Smart Grid Technology“. AP Nazimunisa, VS Kamalam…. 2016. jncet.org Journal of Network …. 0 cites.
- “A provable secure anonymous proxy signature scheme without random oracles.“. R Toluee, MR Asaar…. 2013. pdfs.semanticscholar.org IACR Cryptology ePrint …. 0 cites.
- “A Ring Signature Scheme“. R signatures are introduced by Shamir. 0. . 0 cites.
- “A Ring Signature Scheme Based on Bilinear Pairings“. CAI Qing-hua. 2006. en.cnki.com.cn Microcomputer Applications. 0 cites.
- “A ring signature scheme with anonymous strong-designated verifiers“. 莊嘉富. 2015. tkuir.lib.tku.edu.tw . 0 cites.
- “A Secure Distributed Nymble for Blocking Misbehaving Users in Anonymizing Networks“. N Theja, T Jayakumari. 2012. ciitresearch.org Networking and Communication …. 0 cites.
- “A Short Linkable Ring Signature Scheme for E-Cash Protocol“. L WANG, G ZHANG, C MA. 2008. en.cnki.com.cn Journal of Beijing University of Posts …. 0 cites.
- “A Survey of Privacy Preserving Auditing Techniques for Shared Data in Cloud Computing“. R Kapadiya, J Prajapati. 2015. search.proquest.com International Journal of Computer …. 0 cites.
- “A Threshold Ring Signature Scheme with a Variety of Keys“. MJ Hinek. 2004. pdfs.semanticscholar.org . 0 cites.
- “A Verifiable Ring Signature Scheme Based on Multivariate Public-Key Cryptosystem“. LL Wang. 2013. Trans Tech Publ Applied Mechanics and Materials. 0 cites.
- “A Worthwhile Authentication and Unidentified Data Sharing with Advance Security“. KC LAKSHMI, CMD GULZAR. 2016. ijitech.org . 0 cites.
- “Advanced Traceability Mechanism for Shared Data in the Cloud“. KJ Rasal, SA Kahate. 0. ijettjournal.org. 0 cites.
- “An anonymous ring signature scheme with strong specified verifiers“. 鄭凱隆. 2009. tkuir.lib.tku.edu.tw . 0 cites.
- “An Efficient (nt)-out-of-n Threshold Ring Signature Scheme“. T Isshiki, K Tanaka. 2003. researchgate.net . 0 cites.
- “An Efficient Blind Ring Signature Scheme“. J Zhang, X Liu. 2010. ieeexplore.ieee.org … ICIE), 2010 WASE International Conference on. 0 cites.
- “An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model“. G Zhou, P Zeng, X Yuan, S Chen…. 2017. hindawi.com Security and …. 0 cites.
- “An Efficient Identity-Based Concurrent Signature Scheme“. J Zhang, S Gao. 2010. ieeexplore.ieee.org Information Technology and Applications …. 0 cites.
- “An Efficient Privacy Preserving Scheme over Encrypted Data in Cloud“. K Panmand, S Kadam. 0. pdfs.semanticscholar.org. 0 cites.
- “An efficient ring signature scheme for privacy and anonymous communication“. L Wang, G Zhang, C Ma. 2007. ieeexplore.ieee.org … and E-Commerce, 2007. ISDPE 2007 …. 0 cites.
- “An efficient ring signature scheme for privacy and anonymous communication“. L Wang, G Zhang, C Ma. 2007. ieeexplore.ieee.org … and E-Commerce, 2007. ISDPE 2007 …. 0 cites.
- “An efficient strong designated-verifier ring signature scheme providing maximal signer’s anonymity“. 陳炯燁. 2010. tkuir.lib.tku.edu.tw . 0 cites.
- “An Improved and Trustworthy Communication Framework in Wireless Sensor Network’s“. PVKM Sreenivasulu. 0. ijiset.com. 0 cites.
- “An Original Privacy Protective Mechanism That Supports Public Auditing On Shared Information Hold on Within the Cloud“. M PRAMEELA, DRTS LATHA. 2015. . 0 cites.
- “An Public Auditing Mechanism for Shared Data in the Cloud“. S Rizwana, DW Tahseen. 2015. International Journal of Research. 0 cites.
- “Analysis of Fair Concurrent Signature Exchange Protocol using ATL“. PE Phyu, KKK Kyaw. 2014. ijsetr.com . 0 cites.
- “Attribute-Based Signatures with DNF Policies“. KS Lee, JY Hwang, HJ Kim…. 2009. koreascience.or.kr Journal of the Institute of …. 0 cites.
- “Audit with Privacy and Data Distribution in Cloud Computing“. P Anusha, IRP Reddy. 0. ijracse.com. 0 cites.
- “Auditing Shared Data in Cloud through Privacy Preserving Mechanisms: A Survey“. VR Babu, S EnReddy. 2016. indianjournals.com … of Innovation in Computer Science and …. 0 cites.
- “Auditing the Shared Data in Cloud through Privacy Preserving Mechanisms“. VR Sai, VL Naidu, A Srinivasulu. 2015. search.proquest.com i-manager’s Journal on …. 0 cites.
- “AUTHENTICATION OF DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD“. PG KRISHNA, UMA MAHESWARI. 0. ijiemr.org. 0 cites.
- “Big data privacy-preserved public auditing for shared data in cloud“. G Mangalassery, DL Manilal. 0. ijettcs.org. 0 cites.
- “Big data privacy-preserved public auditing for shared data in cloud“. G Mangalassery, DL Manilal. 0. ijettcs.org. 0 cites.
- “Code-based signature schemes with special properties“. PL Cayrel. 0. . 0 cites.
- “Community Auditing Cloud Partitioning for the Public Cloud“. P SAISWAPNA, M CHIRANJEEVI. 2015. ijitech.org . 0 cites.
- “Confidentiality in Public Auditing for Shared Data in the Cloud“. GCR REDDY, DRGSV KUMAR. 2015. . 0 cites.
- “CONFIRMATION OF DATA INTEGRITY CONCERNING SHARED DATA IN CLOUD PLATFORM“. L Jadi, B Uppalaiah. 0. ijares.com. 0 cites.
- “Constructing Designated-Verifier Ring Signature and Ring Signcryption under the k-CCA2 Assumption“. F Xiao-tong, L Wen. 2012. ieeexplore.ieee.org Intelligent Networking and Collaborative …. 0 cites.
- “Contributions on fair exchange of digital signatures“. Y Wang. 2014. ro.uow.edu.au . 0 cites.
- “Contributions to privacy preserving with ring signatures“. YQ Chen. 2006. ro.uow.edu.au . 0 cites.
- “Converting Cryptographic Schemes from Composite Order to Prime Order Pairing“. R Kabaleeshwaran, MPL Das, S Chatterjee. 0. ece.iisc.ernet.in. 0 cites.
- “Cost-Effective Authentic & Anonymous Data Sharing with Forward Security“. R Nagar, DM Patil, DM Patil, CD Pagare. 0. ijream.org. 0 cites.
- “Crypto-Book: Privacy Preserving Online Identities“. J Maheswaran, D Wolinsky, B Ford. 0. cs.yale.edu. 0 cites.
- “Cryptographic protocols from declarative specifications“. M Backes, RM Reischuk. 2010. Proceedings of the Grande Region Security and …. 0 cites.
- “CT-RSA 2006“. D Pointcheval. 0. Springer. 0 cites.
- “Decentralized Access Control Scheme for Secure Data Storage in Clouds“. BK VENI, GV VANI. 2015. . 0 cites.
- “Decentralized Privacy Preserving for Securing Data in Clouds“. P VidhyaLakshmi, C Premalatha, M RamyaRamPrasad. 0. ijreat.org. 0 cites.
- “Deniable Ring Signatures“. E Reich. 2007. dspace.mit.edu . 0 cites.
- “Design of New Linearly Homomorphic Signatures on Lattice“. R Choi, K Kim. 2017. pdfs.semanticscholar.org . 0 cites.
- “Design the Efficiency Public Auditing Mechanism Using Identity Privacy and Traceability Concepts“. D Sharanya, KR Prasad, MM Bala. 0. ijarf.com. 0 cites.
- “Designated verifier ring signature and ring signcryption“. X Fu, W Liu, R Shi. 2013. inderscienceonline.com International Journal of Intelligent …. 0 cites.
- “Digital Signatures“. T Baigèneres, Y Lu, S Vaudenay, P Junod…. 2006. Springer A Classical Introduction …. 0 cites.
- “Distributed System in Platform Security Using Mobile Agent“. B Sriprathha, S Muthukumaraswamy. 0. pdfs.semanticscholar.org. 0 cites.
- “Dynamic privacy management for communications of clients in privacy-preserving groups“. ME Van Dijk, E Kolman, R Hodgman. 2017. Google Patents US Patent 9,660,813. 0 cites.
- “Effective data sharing using advanced ring signature with forward security“. E Chandanapriya, G Murali. 2016. ieeexplore.ieee.org Communication and Electronics …. 0 cites.
- “ENCRYPTION-BASED ACCESS CONTROL WITH EFFICIENT REVOCATION“. VJ Naik, M Eranna. 0. ijetcse.com. 0 cites.
- “Enhanced Cloud Access Control Methodology for Preventing Leakage of Sensitive and Policy Information“. Q FATIMA, S JABEEN, S FARHA. 2015. . 0 cites.
- “Enhancement of Generalized Ring Signatures with Convertibility“. SF Tzeng, SJ Horng. 2012. ieeexplore.ieee.org Biometrics and Security Technologies …. 0 cites.
- “Erratum: Ring signatures for benzenoids with up to seven rings, Part 2: Pericondensed systems“. AT Balaban, M Randić. 2012. Wiley Online Library International Journal of Quantum …. 0 cites.
- “Fair exchange signature schemes“. K KyungSup. 2010. cnki.com.cn Science. 0 cites.
- “FORWARDED SECURE IDENTITY BASED RING SIGNATURE SCHEME WITH SEGMENTED CELLULAR AUTOMATA SCHEMES“. SN Saranya, P Thilagavathi, M Suguna. 0. ijcrcst.com. 0 cites.
- “Generalized Anonymous Information Sharing“. J Ren, L Ham. 2007. ieeexplore.ieee.org … Processing Applications for Public Security and …. 0 cites.
- “Group-oriented ring signature.“. C Ma, J Ao. 2011. eprint.iacr.org IACR Cryptology ePrint Archive. 0 cites.
- “Hierarchical Ring Signatures Revisited–Unconditionally and Perfectly Anonymous Schnorr Version“. Ł Krzywiecki, M Sulkowska, F Zagórski. 2015. Springer International Conference on …. 0 cites.
- “Homomorphic authenticable ring signature mechanism for Public Auditing on shared data in the Cloud“. MSGD Patwardhan, BW Balkhande. 0. ijecs.in. 0 cites.
- “How to leak a secret from multiple sources“. J Reny, L Harnz, T Li. 2008. ieeexplore.ieee.org Military Communications Conference …. 0 cites.
- “ID-Based Deniable Ring Signature With Constant-Size Signature And Its Extention“. C HU, P LIU. 2010. pdfs.semanticscholar.org Journal of Computational Information …. 0 cites.
- “Identity Based Ring Signature“. SSMCRWC Lui, LCKHSM Yiu. 0. pdfs.semanticscholar.org. 0 cites.
- “Identity Based Threshold Ring Signature from Lattices“. B Wei, Y Du, H Zhang, F Zhang, H Tian…. 2014. Springer … Conference on Network …. 0 cites.
- “Identity-based ring signature scheme based on quadratic residuesfD“. X I’Iu, Q Zhiguang, L Fagen. 0. . 0 cites.
- “Identity-Based Xtr Blind Signature Scheme“. Q Tang, F Shen. 2013. Taylor & Francis Intelligent Automation & Soft Computing. 0 cites.
- “Identity-basedAuthentic and Anonymous Data Sharing with Forward Security“. S Mohan. 2016. ijircee.in Identity. 0 cites.
- “IKS“. J Koch. 2015. . 0 cites.
- “Implementación en Java de una librería para la creación de firma grupal apta para cloud collaboration“. J Arumí Pauls. 2016. upcommons.upc.edu . 0 cites.
- “Implementing Data Protection using Homomorphic Authenticators and Ring Signatures in Clouds“. R GUMMADI, KJSRI HARSHA. 2015. . 0 cites.
- “IMPROVED GENERALIZED RING SIGNATURES“. HYU CHIEN. 2014. ci.nii.ac.jp ICIC express letters. Part B, Applications: an …. 0 cites.
- “Maintaining Integrity for Shared Data In Cloud With Ring Signatures“. N Nagamani, SS Ali. 2015. ijseat.com IJSEAT. 0 cites.
- “Maintaining unlinkability in group based P2P environments“. JAMJ Herrera-Joancomartı. 0. in3.uoc.edu. 0 cites.
- “Mesospheric airglow and ionospheric responses to upward-propagating acoustic and gravity waves above tropospheric sources“. JB Snively, MD Zettergren. 2013. adsabs.harvard.edu AGU Fall Meeting Abstracts. 0 cites.
- “Modification of One Forward Secure Ring Signature Scheme Based on Bilinear Groups of Composite Order“. Z Cao, X Wu, H Cao. 2013. ieeexplore.ieee.org Cloud and Service Computing (CSC) …. 0 cites.
- “Multivariate Public Key Cryptography-Based Proxy Ring Signature Scheme“. CY Sun, YF Li, XM Si. 2012. Journal of Information Engineering … Journal of …. 0 cites.
- “New Construction of Constant-Size Identity-based Linkable Ring Signature“. F Wang, Y Zheng. 2013. Advanced Institutes of Convergence … Journal of Convergence …. 0 cites.
- “New Convertible Ring Signatures Based on RSA“. K Huang, R Tso. 0. nccur.lib.nccu.edu.tw. 0 cites.
- “Nominative Proxy Ring Signature“. C Hu, P Liu, G Zhang. 2009. ieeexplore.ieee.org … Computing, 2009. SNPD’09. 10th ACIS …. 0 cites.
- “On the definition of anonymity for ring signatures“. M Ohkubo, M Abe. 2006. Springer Lecture notes in computer science. 0 cites.
- “ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES“. P Rangan. 0. pdfs.semanticscholar.org. 0 cites.
- “Optical pattern recognition by diffraction pattern sampling“. HL Kasdan. 1979. proceedings.spiedigitallibrary.org Society of Photo-Optical …. 0 cites.
- “Optimal Data Sharing with Forward Security“. DV Shinde, BM Patil. 2016. pdfs.semanticscholar.org International Journal of Computer …. 0 cites.
- “Optimizing ring signature keys for e-voting“. JL Tornos, JL Salazar, JJ Piles. 2015. ieeexplore.ieee.org Wireless Communications and …. 0 cites.
- “ORUTA: Enabling Security and Public Batch Auditing for Distributed Data in the Cloud“. PV PRIYA, A HARITHA. 2015. . 0 cites.
- “ORUTA: Enabling Security and Public Batch Auditing for Distributed Data in the Cloud“. PV PRIYA, A HARITHA. 2015. . 0 cites.
- “Oruta: Public Auditing for Shared Data in the Cloud Storage“. MMB Patil, MNA Kumar. 2014. irjcs.com . 0 cites.
- “Paleoflood records from anatomical tree-ring signatures“. S St George, E Nielsen. 2003. adsabs.harvard.edu AGU Fall Meeting Abstracts. 0 cites.
- “Poster: Towards Blockchain Transaction Privacy“. M Di Ferrante, R Mercer. 0. clearmatics.com. 0 cites.
- “PPAKBS: Privacy-Preserving Public Auditing for Key generation Based Cloud Storage using Batch Signature“. N Keerthika. 0. ijmcs.info. 0 cites.
- “Price Negotiation Systems for M-commerce“. Z Huafei, B Feng…. 2007. ieeexplore.ieee.org … , 2007. ICC’07. IEEE …. 0 cites.
- “Privacy Enhancing Technologies“. LD Nguyen. 2005. . 0 cites.
- “Privacy on the Blockchain: Unique Ring Signatures“. R Mercer. 2016. arxiv.org arXiv preprint arXiv:1612.01188. 0 cites.
- “Privacy Preserved Data Auditing For Clouds“. RDA Sudha. 0. techscripts.org. 0 cites.
- “Privacy Preserving and Effective User Revocation on Dynamic Groups using CP-ABE Scheme“. MS Kumari, K Santhi, BT Rao. 0. Citeseer. 0 cites.
- “PRIVACY PRESERVING THROUGH RING SIGNATURE METHOD“. HR MANJUNATH. 2015. israse.com . 0 cites.
- “Privacy-Preserving Public Auditing for Shared Data in the Cloud“. CM Jadhav, MSD Shabade. 0. ijecs.in. 0 cites.
- “Privacy-Preserving Public Auditing using Ring Signatures for Secure Cloud Storage“. S Bhagyashri, YB Gurav. 0. . 0 cites.
- “Privacy-Retaining Public Analyzing for Shared Data in the Cloud“. MR Patil, S Dharavath. 2015. ijarcsms.com . 0 cites.
- “Projecte de tesi“. JH Sotoca. 0. . 0 cites.
- “Protection of Shared Data using Auditing in Public Cloud“. N GOPI, R REVATHI, NS SUHASINI. 2016. ijatir.org . 0 cites.
- “Proving Computational Soundness of the Applied Pi-Calculus without Using Computable Parsing“. H Comon-Lundh, M Hagiya, Y Kawamoto, H Sakurada. 0. cs.bham.ac.uk. 0 cites.
- “Public Key Cryptography–PKC 2007“. TOX Wang. 2007. Springer . 0 cites.
- “Public Key Infrastructure: Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30-July 1, 2005, Revised …“. D Chadwick, G Zhao. 2005. books.google.com . 0 cites.
- “Record Maintenance and Secure Preserving Of Shared Data in Public Auditing“. M Rafeeq. 2015. Research Trend International Journal on Emerging Technologies. 0 cites.
- “Regulating the Deep Web Through Controlled BlockChains and Crypto-Currency Networks“. K Hegadekatti. 2016. papers.ssrn.com . 0 cites.
- “RELIABLE AND SECURE DATA SHARING WITH FORWARD SECURITY IN CLOUD ENVIRONMENTS“. K Sekhar, M Anand. 0. ijtre.com. 0 cites.
- “Remote Data Auditing Scheme in Secured Cloud Storage Environment“. PG Scholar. 0. . 0 cites.
- “Research on Electronic Cash Security Technology in Electronic Commerce“. SJ Gong, LD Jin. 2014. Trans Tech Publ Advanced Materials Research. 0 cites.
- “Research on Strongly Unforgeable Ring Signature Scheme Based on ID“. G Zeng. 0. pdfs.semanticscholar.org. 0 cites.
- “Review on Forward Secure Identity based Ring Signature for Data Sharing in the Cloud“. P Rumao, S Pundkar. 2016. search.proquest.com International Journal of Computer …. 0 cites.
- “Revisiting optimistic fair exchange based on ring signatures“. Y Wang, MHA Au, W Susilo. 2014. ieeexplore.ieee.org IEEE Transactions on Information …. 0 cites.
- “Revisiting Optimistic Fair Exchange Based on Ring Signatures……………… Y. Wang, MHA Au, and W. Susilo 1883 A Pragmatic Per-Device Licensing …“. L Zhang, CH Chang, X Ma, J Zhang, J Tao, J Li, J Tian…. 0. ieeexplore.ieee.org. 0 cites.
- “RING CT FOR MONERO“. SN MRL. 0. pdfs.semanticscholar.org. 0 cites.
- “Ring signature scheme from multilinear maps in the standard model“. X Zhang, Z Liu, X Wang. 2015. ieeexplore.ieee.org P2P, Parallel, Grid, Cloud and …. 0 cites.
- “Ring Signatures for Benzenoids With up to Seven Rings, Part 2: Pericondensed Systems (vol 108, pg 898, 2008)“. AT Balaban, M Randic. 2011. … , 350 MAIN ST, MALDEN 02148, MA … …. 0 cites.
- “Ring Signatures of Constant Size Without Random Oracles“. F Tang, H Li. 2014. Springer International Conference on Information Security and …. 0 cites.
- “Ring Signatures of Constant Size Without Random Oracles“. F Tang, H Li. 2014. Springer International Conference on Information Security and …. 0 cites.
- “Ring Signatures with a Designated Receiver“. JS Lee, JH Chang. 0. Korean Institute of Information … Proceedings of the Korean …. 0 cites.
- “RingRainbow–An Efficient Multivariate Ring Signature Scheme“. MSE Mohamed, A Petzoldt. 2017. Springer International Conference on Cryptology in …. 0 cites.
- “Salvation of Information Exchange Over Cloud Service Provider by Predicate Based Algorithm and Finest Access Control by Attribute Based Signature“. NRKAP Narensingh, S Yadav. 0. academia.edu. 0 cites.
- “Scalable Anonymous Authentication“. A Bergal, B Tidor, E Hsu, C Zuo. 0. courses.csail.mit.edu. 0 cites.
- “SCRAM BASED SECURITY FOR DATA SHARING IN DYNAMIC CLOUD ENVIRONMENT“. B Gunalan, T Christoper. 0. ijeete.com. 0 cites.
- “Security Analysis Concerning the Random Numbers of Threshold Ring Signatures“. K Huang, R Tso. 2012. ieeexplore.ieee.org Information Technology: New Generations …. 0 cites.
- “Security Challenges for Public Cloud“. R Raghavendran, L Parthasarathi, N Deepa. 2015. pdfs.semanticscholar.org . 0 cites.
- “Security Preserving Access Control Mechanism In Public Clouds Using PANDA Security Mechanism“. M Pingale, J Pingalkar. 0. spvryan.org. 0 cites.
- “Some Thoughts on Strong Unforgeability in Ring Signature Schemes“. C Wang. 2012. Trans Tech Publ Advanced Materials Research. 0 cites.
- “Special Issue on JITEL 2013 Best Papers“. JM Lopez-Soler. 2014. macrothink.org Network Protocols and Algorithms. 0 cites.
- “Stealth Address, Ring Signatures, Monero“. NT Courtois. 0. nicolascourtois.com. 0 cites.
- “Study of Secure Auditing Techniques with Efficient User revocation In Cloud“. MN Ravindran. 2017. imperialjournals.com Imperial Journal of Interdisciplinary Research. 0 cites.
- “Superior Traceability Machine for Shared Data in the Cloud“. MRK Jayesh, SV Gumaste…. 2015. researchgate.net International Journal of …. 0 cites.
- “Survey on Forward Security for Authentic and Anonymous Data Sharing with Auditing Integrity“. VA Gaikwad, SD Babar. 0. pdfs.semanticscholar.org. 0 cites.
- “Switch Commitments: A Safety Switch for Confidential Transactions.“. T Ruffing, G Malavolta. 2017. eprint.iacr.org IACR Cryptology ePrint Archive. 0 cites.
- “Teleport: anonymity through off-blockchain transaction information transfer A Dark Paper for BTCD“. CJ Lee. 0. . 0 cites.
- “The extracts below are taken from the BCS’s eminent academic monthly, The Computer Journal, published with Oxford University Press.“. I Awan. 2013. academic.oup.com ITNow. 0 cites.
- “Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006: Proceedings“. S Halevi. 2006. books.google.com . 0 cites.
- “This paper provides either security proofs or attacks for a large number of identity-based identification and signature schemes defined either explicitly or implicitly in …“. R Impagliazzo, R Jaiswal, V Kabanets. 2009. infona.pl Journal of Cryptology. 0 cites.
- “Threshold Ring Signatures for Ad-hoc CroupsG“. E Bressonh, J Sternh, M Szydlo. 0. di.ens.fr. 0 cites.
- “Threshold Ring Signatures in the Random Oracle Model“. 一色寿幸, 田中圭介, 東京工業大学数理…. 2004. kurims.kyoto-u.ac.jp 数理解析研究所 …. 0 cites.
- “Threshold Ring Signatures in the Random Oracle Model (Evolutionary Advancement in Fundamental Theories of Computer Science)“. T Isshiki, K Tanaka. 2004. repository.kulib.kyoto-u.ac.jp . 0 cites.
- “Time and frequency domain measurements for plutonium metal rings“. JT Mihalczo, VK Pare, ED Blakeman, TE Valentine…. 1996. osti.gov . 0 cites.
- “Toward Unlinkable Bitcoin Transactions“. A Poelstra, G Maxwell. 0. download.wpsoftware.net. 0 cites.
- “Traceability Mechanism for Sharing Data in Cloud“. KJ Rasal, SA Kahate. 2015. search.proquest.com International Journal of Science …. 0 cites.
- “Track 1-Parallel Algorithms-Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register“. X Li, D Zheng, K Chen. 2007. Berlin: Springer-Verlag, 1973- Lecture Notes in Computer …. 0 cites.
- “Tree-ring signatures and weather anomalies.(Oak stand Guttenberger Forest, weather station Wuerzburg).“. B Becker, R Glaser. 1991. agris.fao.org Forstwissenschaftliches Centralblatt. 0 cites.
- “Two ID-Based Analogous Ring Signature Schemes“. ZJHW Ji-Lin, W Yu-Min. 2005. journal.ucas.ac.cn 中 国科学院 研究生院 学报. 0 cites.
- “Unconditionally Anonymous Controllable ID-Based Ring Signatures“. PK Thandra, J Rajan…. 2015. Taylor & Francis Journal of Discrete …. 0 cites.
- “Unconditionally Anonymous Ring and Mesh Signatures“. X Boyen. 2016. Springer Journal of Cryptology. 0 cites.
- “Universal Forgery on Shen et al.’s Linkable and Convertible ID-based Ring Signature Scheme.“. SJ Hwang. 2014. tkuir.lib.tku.edu.tw ICS. 0 cites.
- “Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures⋆“. X Bultel, P Lafourcade. 0. eprint.iacr.org. 0 cites.
- “Usage of Ring Signatures To Develop Homomorphic Authenticators In Oruta To Confirm The Uprightness Of Shared Information“. B Sneha, GS Suneetha, KC Sekhar. 2015. ijrcct.org IJRCCT. 0 cites.
- “Utilization Of Ring Signatures To Construct Homomorphic Authenticators In ORUTA To Verify The Integrity of Shared Data“. GMP Reddy, KC Pradeep. 2016. ijseat.com IJSEAT. 0 cites.
- “What is the SSN proxy good for?“. HS Hudson, BT Welsch. 2013. adsabs.harvard.edu AGU Fall Meeting Abstracts. 0 cites.
- “Кільцеві підписи та їх властивості“. ДВ Шевченко. 2007. irbis-nbuv.gov.ua Радіоелектронні і комп’ютерні системи. 0 cites.
- “지정된 수신자를 갖는 환 서명“. 이지선, 장직현. 2006. 한국정보과학회 학술발표논문집. 0 cites.
- “一种基于 q-SDH 假设的选择关联环签名方案 Selectively Linkable Ring Signature Scheme Based on the q-SDH Assumption“. 李伟, 唐明伟, 范明钰. 2012. scgx.cbpt.cnki.net 西华大学学报 (自然科学版). 0 cites.
- “两种基于 ID 的类环签名方案“. 张键红, 王继林, 王育民. 2005. journal.ucas.ac.cn 中国科学院大学学报. 0 cites.
- “並存簽章——安全性概念, 分析, 與建構議題“. H Huang. 2008. ir.lib.ncu.edu.tw . 0 cites.
- “並存簽章——安全性概念, 分析, 與建構議題; Concurrent Signatures: Security Notions, Analysis, and Construction Issues“. 黃煥中. 2008. ir.lib.ncu.edu.tw . 0 cites.
- “保護行動代理人所收集資料之研究; The Research of Mobile Agent Collected Data Protection“. 陳和樞. 2004. ir.lib.ncu.edu.tw . 0 cites.
- “具可調整性之環簽章“. 陳子鍾. 2009. airitilibrary.com 亞洲大學會計與資訊學系學位論文. 0 cites.
- “具強指定驗證者的匿名環簽章“. KL Cheng. 2009. airitilibrary.com 淡江大學資訊工程學系碩士班學位論文. 0 cites.
- “具最佳簽章者匿名性的有效指定驗證者之環簽章法“. JY Chen. 2010. airitilibrary.com 淡江大學資訊工程學系碩士班學位論文. 0 cites.
- “具有強指定驗證者匿名性的環簽章法“. CF Chuang. 2015. airitilibrary.com 淡江大學資訊工程學系碩士班學位論文. 0 cites.
- “可指定驗証者的異質群體導向簽章系統“. 茆育成. 2001. ir.nctu.edu.tw . 0 cites.
- “标准模型下条件匿名的环签名方案“. 曾晟珂, 秦志光, 陆庆. 2012. . 0 cites.
- “環狀公開金鑰密碼系統“. 張智超. 2005. ir.lib.ncku.edu.tw . 0 cites.
- “環簽章可識別性之研究“. 劉又銓. 2005. airitilibrary.com 成功大學資訊工程學系學位論文. 0 cites.
- “适用于电子现金协议的简短关联环签名方案“. 王玲玲, 张国印, 马春光. 2008. 118.145.16.222 北京邮电大学学报. 0 cites.
- “适用于电子现金协议的简短关联环签名方案 A Short Linkable Ring Signature Scheme for E-Cash Protocol“. 王玲玲, 张国印, 马春光. 2008. 北京邮电大学学报. 0 cites.
———————————————————-
(Featured Image: ‘Sauron, the Lord of the Rings‘ by Callthistragedy1)