Here below is the list of Most Cited Publications about ‘Ring Signature’.

Last updated November 4th, 2017.

Most Cited ‘Ring Signature’ Publications

  1. Aggregate and verifiably encrypted signatures from bilinear maps“. D Boneh, C Gentry, B Lynn, H Shacham. 2003. Springer Eurocrypt1592 cites.
  2. How to leak a secret“. R Rivest, A Shamir, Y Tauman. 2001. Springer Advances in Cryptology—ASIACRYPT …1355 cites.
  3. Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme“. A Boldyreva. 2003. Springer International Workshop on Public Key Cryptography741 cites.
  4. Efficient non-interactive proof systems for bilinear groups“. J Groth, A Sahai. 2008. Springer Advances in Cryptology–EUROCRYPT 2008637 cites.
  5. Diffraction-pattern sampling for automatic pattern recognition“. GG Lendaris, GL Stanley. 1970. ieeexplore.ieee.org Proceedings of the IEEE332 cites.
  6. 1-out-of-n signatures from a variety of keys“. M Abe, M Ohkubo, K Suzuki. 2002. Springer Advances in Cryptology—Asiacrypt 2002328 cites.
  7. Multi-signatures in the plain public-key model and a general forking lemma“. M Bellare, G Neven. 2006. dl.acm.org Proceedings of the 13th ACM conference on …310 cites.
  8. Accumulators from Bilinear Pairings and Applications.“. L Nguyen. 2005. Springer CT-RSA309 cites.
  9. Threshold ring signatures and applications to ad-hoc groups“. E Bresson, J Stern, M Szydlo. 2002. Springer Annual International Cryptology Conference304 cites.
  10. Sequential Aggregate Signatures and Multisignatures Without Random Oracles.“. S Lu, R Ostrovsky, A Sahai, H Shacham, B Waters. 2006. Springer Eurocrypt288 cites.
  11. Attribute-based signatures.“. HK Maji, M Prabhakaran, M Rosulek. 2011. Springer CT-RSA286 cites.
  12. An efficient strong designated verifier signature scheme“. S Saeednia, S Kremer, O Markowitch. 2003. Springer International conference on …269 cites.
  13. Security models and requirements for healthcare application clouds“. R Zhang, L Liu. 2010. ieeexplore.ieee.org Cloud Computing (CLOUD), 2010 IEEE 3rd …261 cites.
  14. Universal designated-verifier signatures“. R Steinfeld, L Bull, H Wang, J Pieprzyk. 2003. Springer Asiacrypt233 cites.
  15. Off-the-record communication, or, why not to use PGP“. N Borisov, I Goldberg, E Brewer. 2004. dl.acm.org … of the 2004 ACM workshop on Privacy …229 cites.
  16. Oruta: Privacy-preserving public auditing for shared data in the cloud“. B Wang, B Li, H Li. 2012. ieeexplore.ieee.org Cloud Computing (CLOUD), 2012 IEEE 5th …229 cites.
  17. Linkable spontaneous anonymous group signature for ad hoc groups“. JK Liu, VK Wei, DS Wong. 2004. Springer ACISP212 cites.
  18. Generalized identity based and broadcast encryption schemes“. D Boneh, M Hamburg. 2008. Springer Advances in Cryptology-ASIACRYPT 2008208 cites.
  19. Anonymous identification in ad hoc groups“. Y Dodis, A Kiayias, A Nicolosi, V Shoup. 2004. Springer Eurocrypt207 cites.
  20. Pairing-Based Cryptographic Protocols: A Survey.“. R Dutta, R Barua, P Sarkar. 2004. researchgate.net IACR Cryptology ePrint Archive207 cites.
  21. Practical Short Signature Batch Verification.“. AL Ferrara, M Green, S Hohenberger, MØ Pedersen. 2009. Springer CT-RSA206 cites.
  22. Ring signatures: Stronger definitions, and constructions without random oracles“. A Bender, J Katz, R Morselli. 2006. Springer TCC205 cites.
  23. Attribute-based signature and its applications“. J Li, MH Au, W Susilo, D Xie, K Ren. 2010. dl.acm.org … of the 5th ACM Symposium on …204 cites.
  24. Concurrent signatures“. L Chen, C Kudla, KG Paterson. 2004. Springer … on the Theory and Applications of …187 cites.
  25. Threshold attribute-based signatures and their application to anonymous credential systems.“. SF Shahandashti, R Safavi-Naini. 2009. Springer Africacrypt180 cites.
  26. Privacy preserving access control with authentication for securing data in clouds“. S Ruj, M Stojmenovic, A Nayak. 2012. ieeexplore.ieee.org Cluster, Cloud and Grid …179 cites.
  27. Knox: privacy-preserving auditing for shared data with large groups in the cloud“. B Wang, B Li, H Li. 2012. Springer Applied cryptography and network security175 cites.
  28. Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance.“. HK Maji, M Prabhakaran, M Rosulek. 2008. eprint.iacr.org IACR Cryptology ePrint Archive170 cites.
  29. Efficient identity based ring signature“. SSM Chow, SM Yiu, LCK Hui. 2005. Springer International Conference on Applied …164 cites.
  30. Deniable ring authentication“. M Naor. 2002. Springer Crypto158 cites.
  31. Disc galaxies with multiple triaxial structures. II. JHK surface photometry and numerical simulations“. D Friedli, H Wozniak, M Rieke, L Martinet…. 1996. aas.aanda.org Astronomy and …158 cites.
  32. New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing.“. F Zhang, R Safavi-Naini, CY Lin. 2003. eprint.iacr.org IACR Cryptology EPrint Archive154 cites.
  33. Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map.“. F Laguillaumie, D Vergnaud. 2004. Springer SCN152 cites.
  34. Forking lemmas for ring signature schemes“. J Herranz, G Sáez. 2003. Springer International Conference on Cryptology in India151 cites.
  35. Charm: a framework for rapidly prototyping cryptosystems“. JA Akinyele, C Garman, I Miers, MW Pagano…. 2013. Springer Journal of Cryptographic …150 cites.
  36. Blacklistable anonymous credentials: blocking misbehaving users without ttps“. PP Tsang, MH Au, A Kapadia, SW Smith. 2007. dl.acm.org Proceedings of the 14th ACM …149 cites.
  37. Batch Verifications with ID-Based Signatures.“. HJ Yoon, JH Cheon, Y Kim. 2004. Springer ICISC148 cites.
  38. Oruta: Privacy-preserving public auditing for shared data in the cloud“. B Wang, B Li, H Li. 2014. ieeexplore.ieee.org IEEE transactions on cloud computing144 cites.
  39. Hidden attribute-based signatures without anonymity revocation“. J Li, K Kim. 2010. Elsevier Information Sciences139 cites.
  40. Efficient ring signatures without random oracles“. H Shacham, B Waters. 2007. Springer Public Key Cryptography130 cites.
  41. ID-based ring signature and proxy ring signature schemes from bilinear pairings“. AK Awasthi, S Lal. 2005. arxiv.org arXiv preprint cs/0504097130 cites.
  42. Short linkable ring signatures for e-voting, e-cash and attestation“. PP Tsang, VK Wei. 2005. Springer ISPEC121 cites.
  43. On the generic construction of identity-based signatures with additional properties“. D Galindo, J Herranz, E Kiltz. 2006. Springer Asiacrypt117 cites.
  44. Dissent: accountable anonymous group messaging“. H Corrigan-Gibbs, B Ford. 2010. dl.acm.org Proceedings of the 17th ACM conference on …116 cites.
  45. Efficient attribute-based signatures for non-monotone predicates in the standard model“. T Okamoto, K Takashima. 2011. Springer International Workshop on Public Key …114 cites.
  46. Dating past geomorphic processes with tangential rows of traumatic resin ducts“. M Stoffel. 2008. Elsevier Dendrochronologia108 cites.
  47. Multi-designated verifiers signatures“. F Laguillaumie, D Vergnaud. 2004. Springer ICICS107 cites.
  48. Charged particle depletion surrounding Saturn’s F ring: Evidence for a moonlet belt?“. JN Cuzzi, JA Burns. 1988. Elsevier Icarus106 cites.
  49. Trustworthy privacy-preserving car-generated announcements in vehicular ad hoc networks“. V Daza, J Domingo-Ferrer, F Sebé…. 2009. ieeexplore.ieee.org IEEE Transactions on …106 cites.
  50. Identity based undeniable signatures“. B Libert, JJ Quisquater. 2004. Springer CT-RSA100 cites.
  51. Voyager planetary radio astronomy at Neptune“. JW Warwick, DR Evans, GR Peltzer, RG Peltzer…. 1989. search.proquest.com Science98 cites.
  52. ID-based ring signature scheme secure in the standard model“. MH Au, JK Liu, TH Yuen, DS Wong. 2006. Springer International Workshop on Security97 cites.
  53. Mesh signatures“. X Boyen. 2007. Springer Annual International Conference on the Theory and …97 cites.
  54. New identity-based ring signature schemes“. J Herranz, G Sáez. 2004. Springer ICICS97 cites.
  55. Perfect concurrent signature schemes“. W Susilo, Y Mu, F Zhang. 2004. Springer Information and Communications Security96 cites.
  56. Cyberentity security in the internet of things“. H Ning, H Liu, LT Yang. 2013. ieeexplore.ieee.org Computer94 cites.
  57. Identity Based Threshold Ring Signature.“. SSM Chow, LCK Hui, SM Yiu. 2004. Springer ICISC92 cites.
  58. New approaches for deniable authentication“. M Di Raimondo, R Gennaro. 2005. dl.acm.org Proceedings of the 12th ACM conference …91 cites.
  59. Palaeoflood records for the Red River, Manitoba, Canada, derived from anatomical tree-ring signatures“. SS George, E Nielsen. 2003. journals.sagepub.com The Holocene91 cites.
  60. Attribute Based Group Signatures.“. D Khader. 2007. eprint.iacr.org IACR Cryptology ePrint Archive90 cites.
  61. Separable Linkable Threshold Ring Signatures.“. PP Tsang, VK Wei, TK Chan, MH Au, JK Liu, DS Wong. 2004. Springer Indocrypt90 cites.
  62. Short Attribute-Based Signatures for Threshold Predicates.“. J Herranz, F Laguillaumie, B Libert, C Ràfols. 2012. Springer CT-RSA89 cites.
  63. Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world“. X Huang, W Susilo, Y Mu…. 2005. ieeexplore.ieee.org … Information Networking and …86 cites.
  64. Ring signatures without random oracles“. SSM Chow, VK Wei, JK Liu, TH Yuen. 2006. dl.acm.org … of the 2006 ACM Symposium on …86 cites.
  65. A New ID-based Signature with Batch Verification.“. JH Cheon, Y Kim, HJ Yoon. 2004. icms.kaist.ac.kr IACR Cryptology EPrint Archive83 cites.
  66. Ring signatures of sub-linear size without random oracles“. N Chandran, J Groth, A Sahai. 2007. Springer Automata, Languages and Programming82 cites.
  67. Certificate based (linkable) ring signature“. MH Au, JK Liu, W Susilo, TH Yuen. 2007. Springer International Conference on …81 cites.
  68. On the Portability of Generalized Schnorr Proofs.“. J Camenisch, A Kiayias, M Yung. 2009. Springer EUROCRYPT81 cites.
  69. Short designated verifier signature scheme and its identity-based variant“. X Huang, W Susilo, Y Mu, F Zhang. 2008. ro.uow.edu.au 80 cites.
  70. User-private information retrieval based on a peer-to-peer community“. J Domingo-Ferrer, M Bras-Amorós, Q Wu…. 2009. Elsevier Data & Knowledge …78 cites.
  71. Property-based attestation without a trusted third party“. L Chen, H Löhr, M Manulis, AR Sadeghi. 2008. Springer Information Security77 cites.
  72. Survey on anonymous communications in computer networks“. J Ren, J Wu. 2010. Elsevier Computer Communications76 cites.
  73. Attribute-Based Ring Signatures.“. J Li, K Kim. 2008. researchgate.net IACR Cryptology EPrint Archive75 cites.
  74. Policy-based cryptography and applications“. W Bagga, R Molva. 2005. Springer Financial Cryptography75 cites.
  75. Revocable attribute-based signatures with adaptive security in the standard model“. A Escala, J Herranz, P Morillo. 2011. Springer Progress in Cryptology–AFRICACRYPT …74 cites.
  76. Tree-ring response of Populus tremula L. and Quercus robur L. to recent spring floods of the Saône River, France“. L Astrade, Y Bégin. 1997. Taylor & Francis Ecoscience73 cites.
  77. The power of proofs-of-possession: Securing multiparty signatures against rogue-key attacks“. T Ristenpart, S Yilek. 2007. Springer Eurocrypt72 cites.
  78. A separable threshold ring signature scheme“. JK Liu, VK Wei, DS Wong. 2003. Springer International Conference on Information …70 cites.
  79. Footprint: detecting Sybil attacks in urban vehicular networks“. S Chang, Y Qi, H Zhu, J Zhao…. 2012. ieeexplore.ieee.org IEEE Transactions on …70 cites.
  80. A new efficient threshold ring signature scheme based on coding theory“. CA Melchor, PL Cayrel, P Gaborit…. 2011. ieeexplore.ieee.org IEEE Transactions on …69 cites.
  81. How to leak a secret: Theory and applications of ring signatures“. RL Rivest, A Shamir, Y Tauman. 2006. Springer Essays in memory of Shimon Even68 cites.
  82. Calibration of floodplain roughness and estimation of flood discharge based on tree-ring evidence and hydraulic modelling“. JA Ballesteros, JM Bodoque, A Díez-Herrero…. 2011. Elsevier Journal of …67 cites.
  83. Decentralized Attribute-Based Signatures.“. T Okamoto, K Takashima. 2013. Springer Public Key Cryptography67 cites.
  84. Historical patterns of western spruce budworm and Douglas-fir tussock moth outbreaks in the northern Blue Mountains, Oregon, since AD 1700.“. TW Swetnam, BE Wickman, HG Paul, CH Baisan. 1995. researchgate.net 67 cites.
  85. Cryptography from pairings“. KG Paterson. 2006. win.tue.nl London mathematical society lecture note series66 cites.
  86. Claromatic carbon nanostructures“. AT Balaban, DJ Klein. 2009. ACS Publications The Journal of Physical Chemistry C64 cites.
  87. Identity based strong designated verifier signature scheme“. PK Kancharla, S Gummadidala, A Saxena. 2007. content.iospress.com Informatica64 cites.
  88. Privacy in content-oriented networking: Threats and countermeasures“. A Chaabane, E De Cristofaro, MA Kaafar…. 2013. dl.acm.org ACM SIGCOMM …64 cites.
  89. A hydrographic section from South Africa to the southern limit of the Antarctic Circumpolar Current at the Greenwich meridian“. S Gladyshev, M Arhan, A Sokov, S Speich. 2008. Elsevier Deep Sea Research Part I …62 cites.
  90. An identity-based ring signature scheme from bilinear pairings“. CY Lin, TC Wu. 2004. ieeexplore.ieee.org … Networking and Applications, 2004. AINA 2004 …62 cites.
  91. Analytic Novikov for topologists“. J Rosenberg. 1995. mmas.univ-metz.fr Novikov conjectures, index theorems and rigidity62 cites.
  92. The fairness of perfect concurrent signatures“. G Wang, F Bao, J Zhou. 2006. Springer Information and Communications Security62 cites.
  93. K-anonymous secret handshakes with reusable credentials“. S Xu, M Yung. 2004. dl.acm.org Proceedings of the 11th ACM conference on Computer …60 cites.
  94. Location privacy in urban sensing networks: research challenges and directions [security and privacy in emerging wireless networks]“. I Krontiris, FC Freiling, T Dimitriou. 2010. ieeexplore.ieee.org IEEE Wireless …60 cites.
  95. Cost-effective authentic and anonymous data sharing with forward security“. X Huang, JK Liu, S Tang, Y Xiang…. 2015. ieeexplore.ieee.org IEEE Transactions …59 cites.
  96. Predicting photometric and spectroscopic signatures of rings around transiting extrasolar planets“. Y Ohta, A Taruya, Y Suto. 2008. iopscience.iop.org The Astrophysical Journal59 cites.
  97. The dust halo of Saturn’s largest icy moon, Rhea“. GH Jones, E Roussos, N Krupp, U Beckmann…. 2008. science.sciencemag.org …59 cites.
  98. Formation and evolution of planetary systems: upper limits to the gas mass in HD 105“. D Hollenbach, U Gorti, M Meyer, JS Kim…. 2005. iopscience.iop.org The Astrophysical …58 cites.
  99. Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model.“. B Libert, D Vergnaud. 2009. Springer CANS58 cites.
  100. Traceable ring signature“. E Fujisaki, K Suzuki. 2007. Springer Public Key Cryptography58 cites.
  101. Ring signatures: Stronger definitions, and constructions without random oracles“. A Bender, J Katz, R Morselli. 2009. Springer Journal of Cryptology57 cites.
  102. Generic construction of (identity-based) perfect concurrent signatures“. SSM Chow, W Susilo. 2005. Springer International Conference on Information and …56 cites.
  103. On the RS-code construction of ring signature schemes and a threshold setting of RST“. DS Wong, K Fung, JK Liu, VK Wei. 2003. Springer ICICS55 cites.
  104. Efficient zero-knowledge authentication based on a linear algebra problem MinRank“. N Courtois. 2001. Springer ASIACRYPT54 cites.
  105. Short linkable ring signatures revisited“. MH Au, SSM Chow, W Susilo, PP Tsang. 2006. Springer European Public Key …54 cites.
  106. An identity-based ring signature scheme with enhanced privacy“. C Gamage, B Gras, B Crispo…. 2006. ieeexplore.ieee.org … and Workshops, 200653 cites.
  107. Privacy-preserving public auditing for shared cloud data supporting group dynamics“. B Wang, H Li, M Li. 2013. ieeexplore.ieee.org Communications (ICC), 2013 IEEE …53 cites.
  108. Convertible ring signature“. KC Lee, HA Wen, T Hwang. 2005. IET IEE Proceedings-Communications52 cites.
  109. Efficient optimistic fair exchange secure in the multi-user setting and chosen-key model without random oracles“. Q Huang, G Yang, DS Wong, W Susilo. 2008. Springer Lecture Notes in Computer …52 cites.
  110. Ambiguous optimistic fair exchange“. Q Huang, G Yang, DS Wong, W Susilo. 2008. Springer … on the Theory and Application of …51 cites.
  111. Asymmetric concurrent signatures“. K Nguyen. 2005. Springer ICICS51 cites.
  112. Threshold Attribute-Based Signcryption.“. M Gagné, S Narayan, R Safavi-Naini. 2010. Springer SCN51 cites.
  113. Certificateless threshold ring signature“. S Chang, DS Wong, Y Mu, Z Zhang. 2009. Elsevier Information Sciences50 cites.
  114. Generalized digital certificate for user authentication and key establishment for secure communications“. L Harn, J Ren. 2011. ieeexplore.ieee.org IEEE Transactions on Wireless …50 cites.
  115. Identity-based ring signatures from RSA“. J Herranz. 2007. Elsevier Theoretical Computer Science50 cites.
  116. Linkable ring signatures: Security models and new schemes“. JK Liu, DS Wong. 2005. Springer … Conference on Computational Science and Its …50 cites.
  117. Anonymous proxy signatures“. G Fuchsbauer, D Pointcheval. 2008. Springer … on Security and Cryptography for Networks49 cites.
  118. Toward the fair anonymous signatures: Deniable ring signatures“. Y Komano, K Ohta, A Shimbo, S Kawamura. 2006. Springer CT-RSA48 cites.
  119. Policy-Based Signatures.“. M Bellare, G Fuchsbauer. 2014. eprint.iacr.org Public Key Cryptography47 cites.
  120. Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.“. C Chen, J Chen, HW Lim, Z Zhang, D Feng, S Ling…. 2013. Springer CT-RSA46 cites.
  121. Multi-party concurrent signatures“. D Tonien, W Susilo, R Safavi-Naini. 2006. Springer ISC46 cites.
  122. Non-interactive deniable ring authentication“. W Susilo, Y Mu. 2003. Springer International Conference on Information Security and …46 cites.
  123. Routes of Agulhas rings in the southeastern Cape Basin“. G Dencausse, M Arhan, S Speich. 2010. Elsevier Deep Sea Research Part I …46 cites.
  124. Universal designated verifier signatures without random oracles or non-black box assumptions“. F Laguillaumie, B Libert, JJ Quisquater. 2006. Springer SCN44 cites.
  125. A ring signature scheme using bilinear pairings“. J Xu, Z Zhang, D Feng. 2004. Springer International Workshop on Information Security …43 cites.
  126. Composability and On-Line Deniability of Authentication.“. Y Dodis, J Katz, AD Smith, S Walfish. 2009. Springer TCC43 cites.
  127. Identity based ring signature: Why, how and what next“. SSM Chow, RWC Lui, LCK Hui, SM Yiu. 2005. Springer EuroPKI43 cites.
  128. On the security models of (threshold) ring signature schemes“. JK Liu, DS Wong. 2004. Springer International Conference on Information Security and …43 cites.
  129. A suite of non-pairing id-based threshold ring signature schemes with different levels of anonymity“. PP Tsang, MH Au, JK Liu, W Susilo, DS Wong. 2010. Springer ProvSec42 cites.
  130. Finding composite order ordinary elliptic curves using the Cocks–Pinch method“. D Boneh, K Rubin, A Silverberg. 2011. Elsevier Journal of Number Theory42 cites.
  131. Revocable ring signature“. DYW Liu, JK Liu, Y Mu, W Susilo, DS Wong. 2007. Springer Journal of Computer Science …41 cites.
  132. The Tree-Ring Record of Drought on the Canadian Prairies a, b“. S St. George, DM Meko, MP Girardin…. 2009. journals.ametsoc.org Journal of …41 cites.
  133. A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model.“. Z Brakerski, YT Kalai. 2010. microsoft.com IACR Cryptology ePrint Archive40 cites.
  134. A provably secure ring signature scheme in certificateless cryptography“. L Zhang, F Zhang, W Wu. 2007. Springer provsec40 cites.
  135. On the security of auditing mechanisms for secure cloud storage“. Y Yu, L Niu, G Yang, Y Mu, W Susilo. 2014. Elsevier Future Generation Computer Systems39 cites.
  136. Security, privacy, and accountability in wireless access networks“. W Lou, K Ren. 2009. ieeexplore.ieee.org IEEE Wireless Communications39 cites.
  137. Automatic classification of spatial signatures on semiconductor wafermaps“. KW Tobin, SS Gleason…. 1997. proceedings.spiedigitallibrary.org SPIE’s 22nd …38 cites.
  138. One-Time Signatures and Chameleon Hash Functions.“. P Mohassel. 2010. Springer Selected Areas in Cryptography38 cites.
  139. Solutions to Key Exposure Problem in Ring Signature.“. JK Liu, DS Wong. 2008. eprint.iacr.org IJ Network Security38 cites.
  140. A Lattice-Based Threshold Ring Signature Scheme.“. PL Cayrel, R Lindner, M Rückert, R Silva. 2010. Springer LATINCRYPT37 cites.
  141. Efficient and spontaneous privacy-preserving protocol for secure vehicular communication“. H Xiong, K Beznosov, Z Qin…. 2010. ieeexplore.ieee.org … (ICC), 2010 IEEE …37 cites.
  142. Tripartite concurrent signatures“. W Susilo, Y Mu. 2005. Springer Security and Privacy in the Age of Ubiquitous …37 cites.
  143. Blind spontaneous anonymous group signatures for ad hoc groups“. TK Chan, K Fung, JK Liu, VK Wei. 2004. Springer ESAS36 cites.
  144. Verifiable ring signature“. J Lv, X Wang. 2003. sites.google.com Proc. of DMS 2003-The 9th International …36 cites.
  145. Anonymous Webs of Trust.“. M Backes, S Lorenz, M Maffei, K Pecina. 2010. Springer Privacy Enhancing Technologies35 cites.
  146. Improved short lattice signatures in the standard model“. L Ducas, D Micciancio. 2014. Springer International Cryptology Conference35 cites.
  147. List signature schemes“. S Canard, B Schoenmakers, M Stam…. 2006. Elsevier Discrete Applied …35 cites.
  148. Quasi-Dyadic CFS Signatures.“. PSLM Barreto, PL Cayrel, R Misoczki, R Niebuhr. 2010. Springer Inscrypt35 cites.
  149. Subpixel image registration using circular fiducials“. A Efrat, C Gotsman. 1994. World Scientific International Journal of Computational …35 cites.
  150. Archaeological tree-ring dating at the millennium“. SE Nash. 2002. Springer Journal of Archaeological Research34 cites.
  151. Constant-size ID-based linkable and revocable-iff-linked ring signature“. MH Au, JK Liu, W Susilo, TH Yuen. 2006. Springer InDOcRYPT34 cites.
  152. Fighting phishing attacks: A lightweight trust architecture for detecting spoofed emails“. B Adida, S Hohenberger…. 2005. pdfs.semanticscholar.org DIMACS Wkshp on …34 cites.
  153. Role-dependent privacy preservation for secure V2G networks in the smart grid“. H Liu, H Ning, Y Zhang, Q Xiong…. 2014. ieeexplore.ieee.org IEEE Transactions on …34 cites.
  154. Universal designated verifier ring signature (proof) without random oracles“. J Li, Y Wang. 2006. Springer EUC Workshops34 cites.
  155. Escrowed linkability of ring signatures and its applications“. SSM Chow, W Susilo, TH Yuen. 2006. Springer VIETCRYPT33 cites.
  156. Provably Secure Code-Based Threshold Ring Signatures.“. L Dallot, D Vergnaud. 2009. Springer IMA Int. Conf.33 cites.
  157. A survey of ring signature“. L Wang, G Zhang, C Ma. 2008. Springer Frontiers of Electrical and Electronic Engineering …32 cites.
  158. An efficient and provable secure identity-based ring signcryption scheme“. ZC Zhu, Y Zhang, F Wang. 2009. Elsevier Computer standards & interfaces32 cites.
  159. Blind ring signatures secure under the chosen-target-CDH assumption“. J Herranz, F Laguillaumie. 2006. Springer ISC32 cites.
  160. Fully Anonymous Attribute Tokens from Lattices.“. J Camenisch, G Neven, M Rückert. 2012. Springer SCN32 cites.
  161. Short group signatures with controllable linkability“. JY Hwang, S Lee, BH Chung, HS Cho…. 2011. ieeexplore.ieee.org … Security & Privacy …32 cites.
  162. Anonymity 2.0-X. 509 extensions supporting privacy-friendly authentication“. V Benjumea, SG Choi, J Lopez, M Yung. 2007. Springer CANS31 cites.
  163. Multi-designated verifiers signatures: anonymity without encryption“. F Laguillaumie, D Vergnaud. 2007. Elsevier Information Processing Letters31 cites.
  164. Proxy ring signature: formal definitions, efficient construction and new variant“. J Li, TH Yuen, X Chen, Y Wang. 2006. ieeexplore.ieee.org … Intelligence and Security …31 cites.
  165. Robust Receipt-Free Election System with Ballot Secrecy and Verifiability.“. SSM Chow, JK Liu, DS Wong. 2008. internetsociety.org NDSS31 cites.
  166. Towards an anonymous access control and accountability scheme for cloud computing“. M Jensen, S Schäge, J Schwenk. 2010. ieeexplore.ieee.org Cloud Computing (CLOUD) …31 cites.
  167. Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05“. F Zhang, X Chen. 2009. Elsevier Information Processing Letters30 cites.
  168. Deniable ring authentication revisited“. W Susilo, Y Mu. 2004. Springer ACNS30 cites.
  169. Anonymous authentication“. Y Lindell. 2007. repository.cmu.edu Journal of Privacy and Confidentiality29 cites.
  170. Maximum eigenvalues of the reciprocal distance matrix and the reverse Wiener matrix“. B Zhou, N Trinajstić. 2008. Wiley Online Library International Journal of Quantum …29 cites.
  171. Designated verifier signature: definition, framework and new constructions“. Y Li, W Susilo, Y Mu, D Pei. 2007. Springer Ubiquitous Intelligence and Computing28 cites.
  172. Macrofossil and tree-ring evidence for a long-term forest succession and mid-Holocene hemlock decline“. L Filion, F Quinty. 1993. Elsevier Quaternary Research28 cites.
  173. Security and privacy in wireless sensor networks“. A Ukil. 2010. intechopen.com Smart Wireless Sensor Networks28 cites.
  174. A new ring signature scheme with signer-admission property“. CH Wang, CY Liu. 2007. Elsevier Information Sciences27 cites.
  175. Cutting through the Confusion: A Measurement Study of Homograph Attacks.“. T Holgers, DE Watson, SD Gribble. 2006. static.usenix.org USENIX Annual Technical …27 cites.
  176. Efficient secret authenticatable anonymous signcryption scheme with identity privacy“. M Zhang, B Yang, S Zhu, W Zhang. 2008. Springer International Conference on …27 cites.
  177. A novel verifiably encrypted signature scheme without random oracle“. J Zhang, J Mao. 2007. Springer … Conference on Information Security Practice and …26 cites.
  178. Efficient and multi-level privacy-preserving communication protocol for VANET“. H Xiong, Z Chen, F Li. 2012. Elsevier Computers & Electrical Engineering26 cites.
  179. Providing hop-by-hop authentication and source privacy in wireless sensor networks“. Y Li, J Li, J Ren, J Wu. 2012. ieeexplore.ieee.org INFOCOM, 2012 Proceedings IEEE26 cites.
  180. A-Train observations of deep convective storm tops“. M Setvák, K Bedka, DT Lindsey, A Sokol, Z Charvát…. 2013. Elsevier Atmospheric …25 cites.
  181. Certificateless Ring Signatures.“. SSM Chow, WS Yap. 2007. eprint.iacr.org IACR Cryptology ePrint Archive25 cites.
  182. Generalized ring signatures“. J Ren, L Harn. 2008. ieeexplore.ieee.org IEEE Transactions on Dependable and Secure …25 cites.
  183. On the security of an identity based multi-proxy signature scheme“. H Xiong, J Hu, Z Chen, F Li. 2011. Elsevier Computers & Electrical Engineering25 cites.
  184. On the security of an identity based multi-proxy signature scheme“. H Xiong, J Hu, Z Chen, F Li. 2011. Elsevier Computers & Electrical Engineering25 cites.
  185. PPAA: Peer-to-peer anonymous authentication“. P Tsang, S Smith. 2008. Springer Applied Cryptography and Network Security25 cites.
  186. Server-aided signatures verification secure against collusion attack“. SSM Chow, MH Au, W Susilo. 2013. Elsevier Information Security Technical Report25 cites.
  187. Construction of universal designated-verifier signatures and identity-based signatures from standard signatures“. S Shahandashti, R Safavi-Naini. 2008. Springer Public Key Cryptography–PKC 200824 cites.
  188. Electronic group signature method with revocable anonymity, equipment and programs for implementing the method“. DA Modiano, L Frisch, D Mouton. 2009. Google Patents US Patent 7,526,65124 cites.
  189. ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things“. J Su, D Cao, B Zhao, X Wang, I You. 2014. Elsevier Future Generation Computer Systems24 cites.
  190. Extended Artin-Schreier theory of fields“. E Becker. 1984. JSTOR The Rocky Mountain Journal of Mathematics24 cites.
  191. Lightweight email signatures“. B Adida, D Chau, S Hohenberger, RL Rivest. 2006. Springer SCN24 cites.
  192. Tracing-by-linking group signatures“. V Wei. 2005. Springer Information Security24 cites.
  193. A Novel ID-Based Anonymous Signcryption Scheme.“. J Zhang, S Gao, H Chen, Q Geng. 2009. Springer APWeb/WAIM23 cites.
  194. Analysis and improvements of two identity-based perfect concurrent signature schemes“. Z Huang, K Chen, X Lin, R Huang. 2007. content.iospress.com Informatica23 cites.
  195. Code-based Ring Signature Scheme.“. D Zheng, X Li, K Chen. 2007. pdfs.semanticscholar.org IJ Network Security23 cites.
  196. Domain-specific pseudonymous signatures for the German identity card“. J Bender, Ö Dagdelen, M Fischlin, D Kügler. 2012. Springer Information Security23 cites.
  197. Privacy-preserving smart metering with regional statistics and personal enquiry services“. CK Chu, JK Liu, JW Wong, Y Zhao, J Zhou. 2013. dl.acm.org Proceedings of the 8th ACM …23 cites.
  198. Self-organized Anonymous Authentication in Mobile Ad Hoc Networks.“. J Freudiger, M Raya, JP Hubaux. 2009. Springer SecureComm23 cites.
  199. Separable identity-based ring signatures: Theoretical foundations for fighting phishing attacks“. B Adida, S Hohenberger…. 2005. pdfs.semanticscholar.org … of DIMACS Workshop …23 cites.
  200. Tree ring effects and ice core acidities clarify the volcanic record of the first millennium“. MGL Baillie, J McAneney. 2015. clim-past.net Climate of the Past23 cites.
  201. Bidder-anonymous English auction protocol based on revocable ring signature“. H Xiong, Z Chen, F Li. 2012. Elsevier Expert Systems with Applications22 cites.
  202. Linkable democratic group signatures“. M Manulis, AR Sadeghi, J Schwenk. 2006. Springer International Conference on …22 cites.
  203. Traceable ring signature“. E Fujisaki, K Suzuki. 2008. search.ieice.org IEICE transactions on fundamentals of …22 cites.
  204. A simple transitive signature scheme for directed trees“. G Neven. 2008. Elsevier Theoretical Computer Science21 cites.
  205. Accumulators and U-Prove revocation“. T Acar, SSM Chow, L Nguyen. 2013. Springer International Conference on Financial …21 cites.
  206. How to compress Rabin ciphertexts and signatures (and more)“. C Gentry. 2004. Springer Advances in Cryptology–CRYPTO 200421 cites.
  207. How to share a secret“. RL Rivest, A Shamir, Y Tauman. 1979. Citeseer Communications of the ACM21 cites.
  208. A provably secure ID-based ring signature scheme.“. J Herranz, G Sáez. 2003. eprint.iacr.org IACR Cryptology ePrint Archive20 cites.
  209. An efficient anonymous authentication mechanism for delay tolerant networks“. R Su, Z Cao. 2010. Elsevier Computers & Electrical Engineering20 cites.
  210. Anonymous signatures made easy“. M Fischlin. 2007. Springer Public Key Cryptography20 cites.
  211. Attribute Based Signatures for Bounded Multi-level Threshold Circuits.“. S Kumar, S Agrawal, S Balaraman, CP Rangan. 2010. Springer EuroPKI20 cites.
  212. Cyclic conjugation in fluoranthene and its benzo-derivatives. Part 1. Catacondensed systems“. J Đurđević, I Gutman, J Terzić…. 2009. Taylor & Francis Polycyclic Aromatic …20 cites.
  213. Efficient and strongly unforgeable identity‐based signature scheme from lattices in the standard model“. Z Liu, Y Hu, X Zhang, F Li. 2013. Wiley Online Library Security and communication …20 cites.
  214. Forward Secure Ring Signature without Random Oracles.“. JK Liu, TH Yuen, J Zhou. 2011. Springer ICICS20 cites.
  215. Providing source privacy in mobile ad hoc networks“. J Ren, Y Li, T Li. 2009. ieeexplore.ieee.org Mobile Adhoc and Sensor Systems, 2009 …20 cites.
  216. Sanitizable Signatures Revisited.“. TH Yuen, W Susilo, JK Liu, Y Mu. 2008. Springer CANS20 cites.
  217. Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction“. MH Au, JK Liu, W Susilo, TH Yuen. 2013. Elsevier Theoretical Computer Science20 cites.
  218. π-Electron partitions, signatures, and Clar structures of selected benzenoid hydrocarbons“. AT Balaban, M Pompe, M Randić. 2008. ACS Publications The Journal of Physical …20 cites.
  219. Group-oriented fair exchange of signatures“. Q Huang, DS Wong, W Susilo. 2011. Elsevier Information Sciences19 cites.
  220. On perspective of security and privacy-preserving solutions in the internet of things“. L Malina, J Hajny, R Fujdiak, J Hosek. 2016. Elsevier Computer Networks19 cites.
  221. Resisting Traitors in Linkable Democratic Group Signatures.“. MH Ibrahim. 2009. ijns.jalaxy.com.tw IJ Network Security19 cites.
  222. Ring signature with designated linkability“. JK Liu, W Susilo, DS Wong. 2006. Springer International Workshop on Security19 cites.
  223. Sub-linear Size Traceable Ring Signatures without Random Oracles.“. E Fujisaki. 2011. Springer CT-RSA19 cites.
  224. The SPARTA pseudonym and authorization system“. G Bianchi, M Bonola, V Falletta, FS Proto…. 2008. Elsevier Electronic Notes in …19 cites.
  225. A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys.“. S Schäge, J Schwenk. 2010. Springer Financial Cryptography18 cites.
  226. Constructing strong identity-based designated verifier signatures with self-unverifiability“. JH Ki, JY Hwang, DH Nyang, BH Chang, DH Lee, J Lim. 2012. etrij.etri.re.kr ETRI Journal18 cites.
  227. Enhanced security models and a generic construction approach for linkable ring signature“. JK Liu, DS Wong. 2006. World Scientific … Journal of Foundations of Computer Science18 cites.
  228. G2C: Cryptographic Protocols from Goal-Driven Specifications.“. M Backes, M Maffei, K Pecina, RM Reischuk. 2011. Springer TOSCA18 cites.
  229. Ring signature schemes for general ad-hoc access structures“. J Herranz, G Sáez. 2004. Springer ESAS18 cites.
  230. Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions“. B Libert, S Ling, F Mouhartem, K Nguyen…. 2016. Springer Advances in Cryptology …18 cites.
  231. Strontium isotopic and tree-ring signatures of Cedrus brevifolia in Cyprus“. S Rich, SW Manning, P Degryse…. 2012. pubs.rsc.org Journal of Analytical …18 cites.
  232. A Certificateless Proxy Ring Signature Scheme with Provable Security.“. H Xiong, Z Qin, F Li. 2011. pdfs.semanticscholar.org IJ Network Security17 cites.
  233. An efficient static blind ring signature scheme“. Q Wu, F Zhang, W Susilo, Y Mu. 2005. Springer ICISC17 cites.
  234. Attribute-based ring signature scheme with constant-size signature“. W Wenqiang, C Shaozhen. 2010. IET IET Information Security17 cites.
  235. Ip address authorization for secure address proxying using multi-key cgas and ring signatures“. J Kempf, J Wood, Z Ramzan, C Gentry. 2006. Springer Advances in Information and …17 cites.
  236. Linkable ring signature with unconditional anonymity“. JK Liu, MH Au, W Susilo, J Zhou. 2014. ieeexplore.ieee.org IEEE Transactions on …17 cites.
  237. Review of nucleon decay searches at Super-Kamiokande“. V Takhistov. 2016. arxiv.org arXiv preprint arXiv:1605.0323517 cites.
  238. Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors“. B Libert, S Ling, K Nguyen, H Wang. 2016. Springer … on the Theory and Applications of …17 cites.
  239. A secure ring signcryption scheme for private and anonymous communication“. L Wang, G Zhang, C Ma. 2007. ieeexplore.ieee.org Network and Parallel Computing …16 cites.
  240. Attribute‐based ring signcryption scheme“. Z Guo, M Li, X Fan. 2013. Wiley Online Library Security and Communication Networks16 cites.
  241. One-out-of-many proofs: Or how to leak a secret and spend a coin“. J Groth, M Kohlweiss. 2015. discovery.ucl.ac.uk EUROCRYPT (2)16 cites.
  242. Post-quantum Cryptography: Code-Based Signatures.“. PL Cayrel, M Meziani. 2010. Springer AST/UCMA/ISA/ACN16 cites.
  243. Private reputation schemes for p2p systems“. C Boyd, R Ismail, A Josang, S Russell. 2004. eprints.qut.edu.au 16 cites.
  244. Ring Signature Schemes from Lattice Basis Delegation.“. J Wang, B Sun. 2011. Springer ICICS16 cites.
  245. Ring signatures for benzenoids with up to seven rings, Part 1: Catacondensed systems“. M Randić, AT Balaban. 2008. Wiley Online Library International Journal of Quantum …16 cites.
  246. Ring signatures for benzenoids with up to seven rings, Part 2: Pericondensed systems“. AT Balaban, M Randić. 2008. Wiley Online Library International Journal of Quantum …16 cites.
  247. A formal proof of security of Zhang and Kim’s ID-based ring signature scheme.“. J Herranz. 2004. sefcom.asu.edu WOSIS15 cites.
  248. An efficient identity-based ring signature scheme and its extension“. J Zhang. 2007. Springer … Conference on Computational Science and Its …15 cites.
  249. An identity-based proxy ring signature scheme from bilinear pairings“. W Cheng, W Lang, Z Yang, G Liu…. 2004. ieeexplore.ieee.org … 2004. Proceedings. ISCC …15 cites.
  250. Cryptanalysis of a generalized ring signature scheme“. H Wang, F Zhang, Y Sun. 2009. ieeexplore.ieee.org IEEE Transactions on Dependable …15 cites.
  251. Efficient attribute-based signatures for non-monotone predicates in the standard model“. T Okamoto, K Takashima. 2014. ieeexplore.ieee.org IEEE Transactions on Cloud …15 cites.
  252. Efficient id-based threshold ring signature scheme“. J Han, X QiuLiang, C Guohua. 2008. ieeexplore.ieee.org Embedded and Ubiquitous …15 cites.
  253. Efficient linkable and/or threshold ring signature without random oracles“. TH Yuen, JK Liu, MH Au, W Susilo…. 2012. academic.oup.com The Computer …15 cites.
  254. Perfect concurrent signature protocol“. Z Huang, R Huang, X Lin. 2007. ieeexplore.ieee.org Software Engineering, Artificial …15 cites.
  255. Restricted universal designated verifier signature“. X Huang, W Susilo, Y Mu, F Zhang. 2006. Springer UIC15 cites.
  256. A promenade through the new cryptography of bilinear pairings“. X Boyen. 2006. ieeexplore.ieee.org Information Theory Workshop, 2006. ITW’06 Punta …14 cites.
  257. Anomalous earlywood vessel lumen area in black ash (Fraxinus nigra Marsh.) tree rings as a potential indicator of forest fires“. S Kames, JC Tardif, Y Bergeron. 2011. Elsevier Dendrochronologia14 cites.
  258. Anonymity notions for public-key infrastructures in mobile vehicular networks“. G Di Crescenzo, T Zhang…. 2007. ieeexplore.ieee.org Mobile Adhoc and …14 cites.
  259. Baumringsignaturen und Wetteranomalien (Eichenbestand Guttenberger Forst, Klimastation Würzburg)“. B Becker, R Glaser. 1991. Springer Forstwissenschaftliches Centralblatt14 cites.
  260. GDH group-based signature scheme with linkability“. D Zheng, VK Wei, KF Chen. 2006. IET IEE Proceedings-Communications14 cites.
  261. Publicly Verifiable Privacy-Preserving Group Decryption.“. B Qin, Q Wu, W Susilo, Y Mu, Y Wang. 2008. Springer Inscrypt14 cites.
  262. Spring flood reconstruction from continuous and discrete tree ring series“. É Boucher, TBMJ Ouarda, Y Bégin…. 2011. Wiley Online Library Water Resources …14 cites.
  263. Stem analysis of a long-lived black spruce clone at treeline“. S Payette, A Delwaide, C Morneau, C Lavoie. 1994. JSTOR Arctic and Alpine Research14 cites.
  264. A multivariate based threshold ring signature scheme“. A Petzoldt, S Bulygin, J Buchmann. 2013. Springer Applicable Algebra in Engineering …13 cites.
  265. Convertible identity-based anonymous designated ring signatures“. Y Chen, W Susilo, Y Mu. 2006. inderscienceonline.com International Journal of Security …13 cites.
  266. Gmatch: Secure and privacy-preserving group matching in social networks“. B Wang, B Li, H Li. 2012. ieeexplore.ieee.org Global Communications Conference …13 cites.
  267. Location privacy in mobile computing environments“. J Baugh, J Guo. 2006. Springer Ubiquitous Intelligence and Computing13 cites.
  268. More short signatures without random oracles.“. VK Wei, TH Yuen. 2005. pdfs.semanticscholar.org IACR Cryptology ePrint Archive13 cites.
  269. Multi-Designated Verifiers Signatures Revisited.“. SSM Chow. 2008. pdfs.semanticscholar.org IJ Network Security13 cites.
  270. Neutrino superbeams and the magic baseline“. A Asratyan, G Davidenko, A Dolgolenko…. 2003. arxiv.org arXiv preprint hep-ex …13 cites.
  271. Ring signature scheme for ECC-based anonymous signcryption“. YF Chung, ZY Wu, TS Chen. 2009. Elsevier Computer Standards & Interfaces13 cites.
  272. Step-out ring signatures“. M Klonowski, Ł Krzywiecki, M Kutyłowski…. 2008. Springer … Foundations of Computer …13 cites.
  273. Vessel anomalies in Quercus macrocarpa tree rings associated with recent floods along the Red River of the North, United States“. EL Wertz, S St George…. 2013. Wiley Online Library Water Resources Research13 cites.
  274. 1-out-of-n signatures from a variety of keys“. M Abe, M Ohkubo, K Suzuki. 2004. search.ieice.org IEICE TRANSACTIONS on …12 cites.
  275. A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups.“. VK Wei. 2004. pdfs.semanticscholar.org IACR Cryptology ePrint Archive12 cites.
  276. A paleoecological analysis of the petrified trees in the Specimen Creek area of Yellowstone National Park, Montana, USA“. A Chadwick, T Yamamoto. 1984. Elsevier Palaeogeography, palaeoclimatology …12 cites.
  277. An (n–t)-out-of-n Threshold Ring Signature Scheme“. T Isshiki, K Tanaka. 2005. Springer Australasian Conference on Information Security and …12 cites.
  278. An efficient conditionally anonymous ring signature in the random oracle model“. S Zeng, S Jiang, Z Qin. 2012. Elsevier Theoretical Computer Science12 cites.
  279. An efficient threshold anonymous authentication scheme for privacy-preserving communications“. J Ren, L Harn. 2013. ieeexplore.ieee.org IEEE Transactions on Wireless …12 cites.
  280. Anonymity and application privacy in context of mobile computing in eHealth“. D Slamanig, C Stingl, C Menard…. 2008. Springer … Workshop on Mobile …12 cites.
  281. Authenticating with Attributes.“. D Khader. 2008. eprint.iacr.org IACR Cryptology ePrint Archive12 cites.
  282. Controllable ring signatures“. W Gao, G Wang, X Wang, D Xie. 2006. Springer WISA12 cites.
  283. Diffraction pattern sampling for automatic pattern recognition“. G Stanley, G Lendaris. 1969. pdx.edu Soc. Photo-Opt. Instrum. Eng.12 cites.
  284. Distributed Ring Signatures for Identity-Based Scenarios.“. J Herranz, G Sáez. 2004. eprint.iacr.org IACR Cryptology ePrint Archive12 cites.
  285. Efficient provable certificateless blind signature scheme“. J Zhang, S Gao. 2010. ieeexplore.ieee.org Networking, Sensing and Control (ICNSC) …12 cites.
  286. Efficient threshold signer-ambiguous signatures from variety of keys“. M Abe, M Ohkubo, K Suzuki. 2004. search.ieice.org IEICE Transactions on Fundamentals …12 cites.
  287. Fair e-commerce protocols without a third party“. H Li, W Kou, X Du. 2006. ieeexplore.ieee.org … , 2006. ISCC’06. Proceedings. 11th IEEE …12 cites.
  288. Hybrid optical-digital radiography-based system for lung disease detection“. RP Kruger, EL Hall, AF Turner. 1977. osapublishing.org Applied optics12 cites.
  289. Identity-based anonymous designated ring signatures“. Y Chen, W Susilo, Y Mu. 2006. dl.acm.org … of the 2006 international conference on …12 cites.
  290. Method and apparatus for minimizing the telephony ring voltage power supply requirements of an integrated services hub“. E Goodrich II, CL Mahaney. 2005. Google Patents US Patent 6,956,94312 cites.
  291. Online/Offline Ring Signature Scheme.“. JK Liu, MH Au, W Susilo, J Zhou. 2009. Springer ICICS12 cites.
  292. Security considerations in e-cognocracy“. JJ Piles, JL Salazar, J Ruíz, JM Moreno-Jiménez. 2006. Springer ISCIS12 cites.
  293. Topics in Cryptology–CT-RSA 2006: The Cryptographers’ Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005, Proceedings“. D Pointcheval. 2005. books.google.com 12 cites.
  294. Unique ring signatures: A practical construction“. M Franklin, H Zhang. 2013. Springer … Conference on Financial Cryptography and Data …12 cites.
  295. A multi-century tree-ring record of spring flooding on the Mississippi River“. MD Therrell, MB Bialecki. 2015. Elsevier Journal of Hydrology11 cites.
  296. A new type of proxy ring signature scheme with revocable anonymity and no info leaked“. C Hu, P Liu, D Li. 2007. Springer Multimedia Content Analysis and Mining11 cites.
  297. A search for cold water rings“. RE Cheney. 1981. ntrs.nasa.gov 11 cites.
  298. Access control in multi-party wireless sensor networks“. J Maerien, S Michiels, C Huygens, D Hughes…. 2013. Springer … Conference on Wireless …11 cites.
  299. Accountable ring signatures: A smart card approach“. S Xu, M Yung. 2004. Springer Smart Card Research and Advanced Applications VI11 cites.
  300. Ad hoc group signatures“. Q Wu, W Susilo, Y Mu, F Zhang. 2006. Springer International Workshop on Security11 cites.
  301. Aggregating cl-signatures revisited: Extended functionality and better efficiency“. K Lee, DH Lee, M Yung. 2013. Springer … Conference on Financial Cryptography and Data …11 cites.
  302. Anonymous Signatures Revisited.“. V Saraswat, A Yun. 2009. Springer ProvSec11 cites.
  303. Concentric ring signature descriptor for 3d objects“. H Van Nguyen, F Porikli. 2011. ieeexplore.ieee.org Image Processing (ICIP), 2011 18th …11 cites.
  304. Cross-identification of ring signatures in Eocene trees (Sequoia magnifica) from the Specimen Ridge locality of the Yellowstone Fossil Forests“. R Ammons, WJ Fritz, RB Ammons…. 1987. Elsevier Palaeogeography …11 cites.
  305. Egg shell inspection using global image analysis“. YJ Han, Y Feng. 1994. elibrary.asabe.org Applied engineering in agriculture11 cites.
  306. Event-oriented k-times revocable-iff-linked group signatures“. MH Au, W Susilo, SM Yiu. 2006. Springer … Conference on Information Security and Privacy11 cites.
  307. Fair exchange signature schemes“. J Liu, R Sun, KS Kwak. 2010. Springer Science China Information Sciences11 cites.
  308. Fully Structure-Preserving Signatures and Shrinking Commitments.“. M Abe, M Kohlweiss, M Ohkubo…. 2015. pdfs.semanticscholar.org IACR Cryptology …11 cites.
  309. Identity-based chameleon hashing and signatures without key exposure“. X Chen, F Zhang, W Susilo, H Tian, J Li, K Kim. 2014. Elsevier Information Sciences11 cites.
  310. On the security of a proxy ring signature with revocable anonymity“. J Zhang, Y Yang. 2009. ieeexplore.ieee.org … Networking and Security, 2009. MINES’09 …11 cites.
  311. PPC: Privacy-preserving chatting in vehicular peer-to-peer networks“. X Liang, R Lu, X Lin, X Shen. 2010. ieeexplore.ieee.org … Fall (VTC 2010-Fall), 2010 IEEE …11 cites.
  312. Providing witness anonymity in peer-to-peer systems“. B Zhu, S Setia, S Jajodia. 2006. dl.acm.org Proceedings of the 13th ACM conference on …11 cites.
  313. Ring signature with weak linkability and its applications“. IR Jeong, JO Kwon, DH Lee. 2008. ieeexplore.ieee.org IEEE Transactions on …11 cites.
  314. The Puzzle of the Petrified Trees“. HG Coffin. 1992. christintheclassroom.org Dialogue11 cites.
  315. Threshold ring signature without random oracles“. TH Yuen, JK Liu, MH Au, W Susilo, J Zhou. 2011. dl.acm.org Proceedings of the 6th ACM …11 cites.
  316. 标准模型下基于双线性对的前向安全环签名方案“. 王玲玲, 张国印, 马春光. 2009. jeit.ie.ac.cn 电子与信息学报11 cites.
  317. A New Conditionally Anonymous Ring Signature.“. S Zeng, S Jiang, Z Qin. 2011. Springer COCOON10 cites.
  318. A new efficient optimistic fair exchange protocol without random oracles“. Q Huang, G Yang, DS Wong, W Susilo. 2012. Springer International Journal of …10 cites.
  319. Anonymous and publicly linkable reputation systems“. J Blömer, J Juhnke, C Kolb. 2015. Springer … on Financial Cryptography and Data Security10 cites.
  320. Cryptography and Coding“. MG Parker. 2009. Springer 12th IMA International Conference, Cryptography and …10 cites.
  321. Efficient fair exchange from identity-based signature“. DH Yum, PJ Lee. 2008. search.ieice.org IEICE transactions on fundamentals of …10 cites.
  322. Forward Secure Attribute-Based Signatures.“. TH Yuen, JK Liu, X Huang, MH Au, W Susilo, J Zhou. 2012. Springer ICICS10 cites.
  323. Further observations on optimistic fair exchange protocols in the multi-user setting“. X Huang, Y Mu, W Susilo, W Wu, Y Xiang. 2010. Springer International Workshop on …10 cites.
  324. ID-based ring authenticated encryption“. T Cao, D Lin, R Xue. 2005. ieeexplore.ieee.org … and Applications, 2005. AINA 2005. 19th …10 cites.
  325. Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007“. J Pieprzyk, H Ghodosi, E Dawson. 2007. Springer 10 cites.
  326. Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE“. MH Au, JK Liu, W Susilo, J Zhou. 2013. ieeexplore.ieee.org IEEE Transactions on …10 cites.
  327. Security Issues in Vehicular Ad Hoc Networks“. P Caballero-Gil. 2011. intechopen.com Mobile ad-hoc networks: applications10 cites.
  328. Towards practical privacy-preserving digital rights management for cloud computing“. N Joshi, R Petrlic. 2013. ieeexplore.ieee.org Consumer Communications and …10 cites.
  329. W-shaped occultation signatures: Inference of entwined particle orbits in charged planetary ringlets“. VR Eshleman, JV Breakwell, GL Tyler, EA Marouf. 1983. Elsevier Icarus10 cites.
  330. Ad-hoc-group signatures from hijacked keypairs“. B Adida, S Hohenberger…. 2005. people.csail.mit.edu in DIMACS Workshop on …9 cites.
  331. Anonymous communication networks: Protecting privacy on the web“. K Peng. 2014. books.google.com 9 cites.
  332. Attribute-based ring signatures (2008)“. J Li, K Kim. 2008. EPRINT http://eprint. iacr. org/2008/3949 cites.
  333. Contribution to privacy-preserving cryptographic techniques“. MHA Au. 2009. ro.uow.edu.au 9 cites.
  334. Crypto-book: an architecture for privacy preserving online identities“. J Maheswaran, DI Wolinsky, B Ford. 2013. dl.acm.org … of the Twelfth ACM Workshop on …9 cites.
  335. Expressive subgroup signatures“. X Boyen, C Delerablée. 2008. Springer Security and Cryptography for Networks9 cites.
  336. Foundations of fully dynamic group signatures“. J Bootle, A Cerulli, P Chaidos, E Ghadafi…. 2016. Springer … Conference on Applied …9 cites.
  337. Generic Constructions for Strong Designated Verifier Signature.“. D Feng, J Xu, WD Chen. 2011. pdfs.semanticscholar.org JIPS9 cites.
  338. Highly efficient id-based ring signature from pairings“. HY Chien. 2008. ieeexplore.ieee.org Asia-Pacific Services Computing Conference, 2008 …9 cites.
  339. ID-based deniable ring authentication with constant-size signature“. L Wang, G Zhang, C Ma. 2008. Springer Frontiers of Computer Science in China9 cites.
  340. Identity-committable signatures and their extension to group-oriented ring signatures“. CK Chu, WG Tzeng. 2007. Springer Information Security and Privacy9 cites.
  341. On privacy-preserving ways to porting the austrian eID system to the public cloud“. B Zwattendorfer, D Slamanig. 2013. Springer IFIP International Information Security …9 cites.
  342. On tamper-resistance from a theoretical viewpoint“. P Mateus, S Vaudenay. 2009. Springer … Hardware and Embedded Systems-CHES 20099 cites.
  343. Privacy in wireless sensor networks using ring signature“. A Debnath, P Singaravelu, S Verma. 2014. Elsevier Journal of King Saud University …9 cites.
  344. Rogue-key attacks on the multi-designated verifiers signature scheme“. KA Shim. 2008. Elsevier Information Processing Letters9 cites.
  345. Using SEND signature algorithm agility and multiple-key CGA to secure proxy neighbor discovery and anycast addressing“. T Cheneau, M Laurent. 2011. ieeexplore.ieee.org Network and Information Systems …9 cites.
  346. 一种签名长度固定的基于身份的环签名方案“. 王玲玲, 张国印, 马春光. 2007. jeit.ie.ac.cn 电子与信息学报9 cites.
  347. 两种无证书的分布环签名方案“. 桑永宣, 曾吉文. 2008. 电子学报9 cites.
  348. (Convertible) undeniable signatures without random oracles“. TH Yuen, MH Au, JK Liu, W Susilo. 2007. Springer International Conference on …8 cites.
  349. A new receipt-free voting scheme based on linkable ring signature for designated verifiers“. G Chen, C Wu, W Han, X Chen…. 2008. ieeexplore.ieee.org … Software and Systems …8 cites.
  350. A provably secure threshold ring signature scheme in certificateless cryptography“. H Wang, S Han. 2010. ieeexplore.ieee.org Information Science and Management …8 cites.
  351. A restricted multi-show credential system and its application on e-voting“. JK Liu, DS Wong. 2005. Springer ISPEC8 cites.
  352. A ring signature scheme based on the Nyberg-Rueppel signature scheme“. C Gao, Z Yao, L Li. 2003. Springer Applied Cryptography and Network Security8 cites.
  353. A ring-signature anonymous authentication method based on one-way accumulator“. Z Xu, H Tian, DS Liu, J Lin. 2010. ieeexplore.ieee.org … Systems, Networks and …8 cites.
  354. AFS: privacy-preserving public auditing with data freshness in the cloud“. P Maheswari, B Sindhumathi. 0. academia.edu … of Computer Engineering (IOSRJCE) e-ISSN8 cites.
  355. An efficient attribute-based ring signature scheme“. W Wenqiang, C Shaozhen. 2009. ieeexplore.ieee.org Computer Science-Technology …8 cites.
  356. Analysis of bilinear pairing-based accumulator for identity escrowing“. C Tartary, S Zhou, D Lin, H Wang, J Pieprzyk. 2008. IET IET Information Security8 cites.
  357. Analysis of revocable-iff-linked ring signature scheme“. IR Jeong, JO Kwon, DH Lee. 2009. jstage.jst.go.jp IEICE transactions on fundamentals of …8 cites.
  358. Anonymous authentication protocols for vehicular ad hoc networks: an overview“. H Xiong, Z Guan, J Hu, Z Chen. 2012. intechopen.com Applied Cryptography and …8 cites.
  359. Bathymetric and oceanographic applications of Kalman filtering techniques“. R Brammer, R Pass, J White. 1983. ieeexplore.ieee.org IEEE transactions on automatic …8 cites.
  360. Blind signature and ring signature schemes: Rehabilitation and attack“. SSM Chow. 2009. Elsevier Computer Standards & Interfaces8 cites.
  361. Efficient authentication and key agreement protocol with anonymity for delay tolerant networks“. Y Ding, X Zhou, Z Cheng, W Zeng. 2013. Springer Wireless personal communications8 cites.
  362. Enhancing the trust and perceived security in e-cognocracy“. J Piles, J Salazar, J Ruíz, J Moreno-Jiménez. 2007. Springer E-Voting and Identity8 cites.
  363. Frequency domain image analysis for detecting stress cracks in corn kernels“. YJ Han, Y Feng, CL Weller. 1996. elibrary.asabe.org Applied Engineering in Agriculture8 cites.
  364. Mesoscale variability between New York and Bermuda from repeated XBT sections and satellite altimetry“. RE Cheney, BC Douglas, E Khedouri…. 1985. journals.ametsoc.org Journal of physical …8 cites.
  365. Mitigating phishing with ID-based online/offline authentication“. Q Ren, Y Mu, W Susilo. 2008. dl.acm.org … of the sixth Australasian conference on …8 cites.
  366. Partial Signatures and their Applications.“. M Bellare, S Duan. 2009. ai2-s2-pdfs.s3.amazonaws.com IACR Cryptology ePrint Archive8 cites.
  367. PBC library manual 0.5. 11“. B Lynn. 2006. crypto.stanford.edu 8 cites.
  368. Security analysis of an ultra‐lightweight RFID authentication protocol—SLMAP“. I Erguler, C Unsal, E Anarim…. 2012. Wiley Online Library Security and …8 cites.
  369. Security approaches in e-cognocracy“. JL Salazar, JJ Piles, J Ruiz-Mas…. 2010. Elsevier Computer Standards & …8 cites.
  370. Security Flaw of an ECC-based Signcryption Scheme with Anonymity.“. H Xiong, J Hu, Z Chen. 2013. ijns.femto.com.tw IJ Network Security8 cites.
  371. Short accountable ring signatures based on DDH“. J Bootle, A Cerulli, P Chaidos, E Ghadafi…. 2015. Springer … on Research in …8 cites.
  372. Signatures on a ring“. T Kanzaki. 1992. ousar.lib.okayama-u.ac.jp Mathematical Journal of Okayama University8 cites.
  373. Strong designated verifier ID-based ring signature scheme“. W Lei, L Daxing. 2008. ieeexplore.ieee.org … Science and Engineering, 2008. ISISE’08 …8 cites.
  374. Strong designated verifier ring signature scheme“. JS Lee, J Chang. 2007. Springer Innovations and Advanced Techniques in Computer …8 cites.
  375. Threshold ring signature scheme based on the curve“. H Kuwakadot, H Tanakat. 2003. ipsj.ixsq.nii.ac.jp IPSJ Journal8 cites.
  376. Two new identity-based threshold ring signature schemes“. L Deng, J Zeng. 2014. Elsevier Theoretical Computer Science8 cites.
  377. A Framework for Unique Ring Signatures.“. MK Franklin, H Zhang. 2012. ai2-s2-pdfs.s3.amazonaws.com IACR Cryptology …7 cites.
  378. Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting.“. CA Melchor, S Bettaieb, X Boyen, L Fousse…. 2013. books.google.com …7 cites.
  379. An improved threshold ring signature scheme based on error correcting codes“. PL Cayrel, S El Yousfi Alaoui, G Hoffmann…. 2012. Springer Arithmetic of Finite …7 cites.
  380. AnonRep: Towards Tracking-Resistant Anonymous Reputation.“. E Zhai, DI Wolinsky, R Chen, E Syta, C Teng, B Ford. 2016. usenix.org NSDI7 cites.
  381. Attribute-based signatures for circuits from multilinear maps“. F Tang, H Li, B Liang. 2014. Springer International Conference on Information Security7 cites.
  382. Attribute-based signatures with user-controlled linkability“. A El Kaafarani, L Chen, E Ghadafi…. 2014. Springer … Conference on Cryptology …7 cites.
  383. Authenticating with attributes in online social networks“. D Cao, B Zhao, X Wang, J Su…. 2011. ieeexplore.ieee.org … Systems (NBiS), 2011 …7 cites.
  384. Computationally sound symbolic anonymity of a ring signature“. Y Kawamoto, H Sakurada…. 2008. researchgate.net … and Issues in the Theory of …7 cites.
  385. Efficient sanitizable signatures without random oracles“. RWF Lai, T Zhang, SSM Chow, D Schröder. 2016. Springer European Symposium on …7 cites.
  386. Fair exchange signature schemes“. J Liu, R Sun, W Ma, Y Li, X Wang. 2008. ieeexplore.ieee.org … Information Networking and …7 cites.
  387. Improved Threshold Ring Signature for Ad-Hoc Group“. J Xiao, G Zeng, J Liao, P Huang. 2006. ieeexplore.ieee.org … , Networking and Mobile …7 cites.
  388. Integrity and Privacy Sustenance of Shared Large Scale Images in the Cloud by Ring Signature“. R Annamalai, J Srikanth…. 2015. search.proquest.com International Journal of …7 cites.
  389. Introducing accountability to onion routing“. M Backes, J Clark, P Druschel, A Kate, M Simeonovski. 2013. Grande Region Security and …7 cites.
  390. New insight to preserve online survey accuracy and privacy in big data era“. JK Liu, MH Au, X Huang, W Susilo, J Zhou…. 2014. Springer European Symposium on …7 cites.
  391. Non-interactive conference key distribution and its applications“. R Safavi-Naini, S Jiang. 2008. dl.acm.org Proceedings of the 2008 ACM symposium on …7 cites.
  392. Optimistic Fair Exchange of Ring Signatures.“. L Qu, G Wang, Y Mu. 2011. Springer SecureComm7 cites.
  393. Restricted identification scheme and diffie-hellman linking problem“. M Kutyłowski, Ł Krzywiecki, P Kubiak, M Koza. 2011. Springer INTRUST7 cites.
  394. Ring signature scheme based on multivariate public key cryptosystems“. S Wang, R Ma, Y Zhang, X Wang. 2011. Elsevier Computers & Mathematics with …7 cites.
  395. SEFAP: An Email System for Anti-Phishing“. Q Ren, Y Mu, W Susilo. 2007. ieeexplore.ieee.org … Science, 2007. ICIS 2007. 6th IEEE …7 cites.
  396. Shared-key signature and its application to anonymous authentication in ad hoc group“. Q Wu, X Chen, C Wang, Y Wang. 2004. Springer ISC7 cites.
  397. Subliminal channels in the identity-based threshold ring signature“. CL Yang, CM Li, T Hwang. 2009. Taylor & Francis International Journal of Computer …7 cites.
  398. The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity.“. R Hayashi, K Tanaka. 2005. Springer Public Key Cryptography7 cites.
  399. UPnP and secure group communication technique for zero-configuration environment construction using incremental clustering“. PC Sethi. 2013. academia.edu International Journal of Engineering7 cites.
  400. A note on an identity-based ring signature scheme with signer verifiability“. JY Hwang. 2011. Elsevier Theoretical Computer Science6 cites.
  401. A provably secure proxy signature scheme from bilinear pairings“. A Wang, J Li, Z Wang. 2010. Springer Journal of Electronics (China)6 cites.
  402. Advances in Cryptology-CRYPTO 2002: 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings“. M Yung. 2002. books.google.com 6 cites.
  403. Anonymous context based role activation mechanism“. PD Chowdhury, B Christianson, J Malcolm. 2005. Springer International Workshop on …6 cites.
  404. Confessible threshold ring signatures“. YS Chen, CL Lei, YP Chiu…. 2006. ieeexplore.ieee.org Systems and Networks …6 cites.
  405. Cooperative influence of water binding to peptides by N H··· OH2 and C O··· HOH hydrogen bonds: Study by Ab Initio calculations“. CL Sun, CS Wang. 2012. Wiley Online Library International Journal of Quantum …6 cites.
  406. Distributed ring signatures from general dual access structures“. J Herranz, G Sáez. 2006. Springer Designs, Codes and Cryptography6 cites.
  407. Electronic health records: An enhanced security paradigm to preserve patient’s privacy“. D Slamanig, C Stingl. 2009. Springer International Joint Conference on Biomedical …6 cites.
  408. Far-infrared signatures of hydrogen bonding in phenol derivatives“. DJ Bakker, A Peters, V Yatsyna…. 2016. ACS Publications The journal of …6 cites.
  409. ID-based Proxy Ring Signature Scheme [J]“. JZ Zhang, RH Xue, LH Peng. 2011. en.cnki.com.cn Computer Engineering6 cites.
  410. Inter device personal information transfer“. AM Olson. 2006. Google Patents US Patent 7,127,2426 cites.
  411. Invariants for the FoCaL language“. R Rioboo. 2009. Springer Annals of Mathematics and Artificial Intelligence6 cites.
  412. Noninteractive, anonymously authenticated, and traceable message transmission for VANETs“. MH Ibrahim. 2010. hindawi.com International Journal of Vehicular Technology6 cites.
  413. Prototyping a lightweight trust architecture to fight phishing“. D Chau. 2005. pdfs.semanticscholar.org … And Artificial Intelligence Laboratory, Tech. Rep …6 cites.
  414. Response of anatomical features of broadlesf tree root in karst area to soil erosion“. L Mei, WK Ke. 2011. Elsevier Procedia Engineering6 cites.
  415. Ring proxy signatures“. B Wei, F Zhang, X Chen. 2008. Springer Journal of Electronics (China)6 cites.
  416. Saving On-Line Privacy.“. J Camenisch, G Neven. 2009. Springer PrimeLife6 cites.
  417. Security analysis and enhancement for three‐party password‐based authenticated key exchange protocol“. J Zhao, D Gu, L Zhang. 2012. Wiley Online Library Security and Communication …6 cites.
  418. The Solution of Safety of Electronic Cash in E-Commerce under Cloud Computing Environment“. SJ Gong, LP Zeng. 2014. Trans Tech Publ Advanced Materials Research6 cites.
  419. Threshold ring signatures and applications to ad-hoc groups. full version“. E Bresson, J Stern, M Szydlo. 2002. cs.ucdavis.edu 6 cites.
  420. 一种基于身份的代理环签名方案“. 张建中, 薛荣红, 彭丽慧. 2011. 计算机工程6 cites.
  421. 无证书盲签名方案“. 苏万力, 张跃宇, 张晓红, 王育民. 2009. tec.icbuy.com 电子科技大学学报6 cites.
  422. 无证书盲签名方案“. 苏万力, 张跃宇, 张晓红, 王育民. 2009. tec.icbuy.com 电子科技大学学报6 cites.
  423. A collaboratively hidden location privacy scheme for VANETs“. Y Mei, G Jiang, W Zhang, Y Cui. 2014. journals.sagepub.com International Journal of …5 cites.
  424. A general framework for group authentication and key exchange protocols“. H Yang, L Jiao, VA Oleshchuk. 2014. Springer Foundations and Practice of Security5 cites.
  425. A multi-purpose group signature for vehicular network security“. MSI Mamun, A Miyaji, H Takada. 2014. ieeexplore.ieee.org Network-Based Information …5 cites.
  426. A new multi-bank e-cash protocol with anonymity control“. L Wang. 2009. ieeexplore.ieee.org Information Assurance and Security, 2009. IAS’09 …5 cites.
  427. A new type of proxy ring signature scheme with revocable anonymity“. C Hu, D Li. 2007. ieeexplore.ieee.org … , and Parallel/Distributed Computing, 2007. SNPD …5 cites.
  428. A new yardstick for benzenoid polycyclic aromatic hydrocarbons“. M Pompe, M Randic, AT Balaban. 2008. ACS Publications The Journal of Physical …5 cites.
  429. A novel anonymous authenticated key agreement protocol for vehicular ad hoc networks“. C Büttner, SA Huss. 2015. ieeexplore.ieee.org Information Systems Security and Privacy …5 cites.
  430. A novel fuzzy identity-based signature with dynamic threshold“. W Chen, L Zhu, X Cao, Y Geng. 2009. ieeexplore.ieee.org Network and System Security …5 cites.
  431. A proxy ring signature scheme with revocable anonymity from bilinear pairings“. H Wang. 2009. ieeexplore.ieee.org … Information Networking and Security, 2009. MINES’ …5 cites.
  432. A Strong RSA-based and Certificateless-based Signature Scheme.“. CC Chang, CY Sun, SC Chang. 2016. ijns.jalaxy.com.tw IJ Network Security5 cites.
  433. A survey of noninteractive zero knowledge proof system and its applications“. H Wu, F Wang. 2014. hindawi.com The Scientific World Journal5 cites.
  434. A survey of ring signature“. W Lingling, Z Guoyin…. 2008. academic.hep.com.cn Frontiers of Electrical and …5 cites.
  435. An efficient strong ID-based signature scheme with unforgeability“. J Zhang, X Liu. 2010. ieeexplore.ieee.org Frontier of Computer Science and Technology …5 cites.
  436. Anonymous identification and designated-verifiers signatures from insecure batch verification“. SSM Chow, DS Wong. 2007. Springer EuroPKI5 cites.
  437. Attribute-based signature scheme with constant size signature“. F Zeng, C Xu, Q Li, X Zhang. 2012. pdfs.semanticscholar.org Journal of Computational …5 cites.
  438. Borromean ring signatures“. G Maxwell, A Poelstra. 2015. pdfs.semanticscholar.org 5 cites.
  439. Continuous earlywood vessels chronologies in floodplain ring-porous species can improve dendrohydrological reconstructions of spring high flows and flood levels“. S Kames, JC Tardif, Y Bergeron. 2016. Elsevier Journal of Hydrology5 cites.
  440. Democratic Group Signatures with Threshold Traceability.“. D Zheng, X Li, C Ma, K Chen, J Li. 2008. eprint.iacr.org IACR Cryptology ePrint Archive5 cites.
  441. Di-electron production in C+ C and p+ p collisions with HADES“. T Eberl. 2007. Springer The European Physical Journal C-Particles and Fields5 cites.
  442. Efficient verifiable ring encryption for ad hoc groups“. JK Liu, PP Tsang, DS Wong. 2005. Springer European Workshop on Security in Ad-hoc …5 cites.
  443. Energetic particle signatures of satellites and rings in Neptune’s magnetosphere“. RS Selesnick, EC Stone. 1992. Elsevier Advances in Space Research5 cites.
  444. Generic constructions for universal designated-verifier signatures and identity-based signatures from standard signatures“. SF Shahandashti, R Safavi-Naini. 2009. IET IET Information security5 cites.
  445. Identity-based threshold ring signature without pairings“. X Hu, Q ZhiGuang, L FaGen. 2008. ieeexplore.ieee.org Communications, Circuits and …5 cites.
  446. Improved lattice-based threshold ring signature scheme“. S Bettaieb, J Schrek. 2013. Springer International Workshop on Post-Quantum …5 cites.
  447. Information Security Practice and Experience“. L Zhang, Q Wu, B Qin, H Deng, J Liu…. 2014. researchgate.net … Asymmetric Group Key …5 cites.
  448. Lattice-based multi-party concurrent signatures scheme“. S Wang, L Liu, J Chen, J Sun, X Zhang…. 2013. ieeexplore.ieee.org … (INCoS), 2013 5th …5 cites.
  449. Lightweight anonymous authentication for ad hoc group: A ring signature approach“. X Yang, W Wu, JK Liu, X Chen. 2015. Springer International Conference on Provable …5 cites.
  450. Linkable ring signatures from linear feedback shift register“. D Zheng, X Li, K Chen, J Li. 2007. Springer Emerging Directions in Embedded and …5 cites.
  451. Multi-Party Concurrent Signature Scheme Based on Designated Verifiers.“. J Xushuai, Z Zhou, W Qin, Q Jiang, N Zhou. 2013. pdfs.semanticscholar.org JCP5 cites.
  452. New definitions and designs for anonymous signatures“. M Bellare, S Duan. 2009. pdfs.semanticscholar.org Cryptology ePrint Archive, Report …5 cites.
  453. Perfect Concurrent Signature Protocol for Symmetric Participant“. J Han, X Qiuliang, Z Bo. 2008. ieeexplore.ieee.org … Intelligence and Security, 2008. CIS’08 …5 cites.
  454. Privacy-Preserving Digital Rights Management based on Attribute-based Encryption“. R Petrlic, C Sorge. 2014. ieeexplore.ieee.org … , Mobility and Security (NTMS), 2014 6th …5 cites.
  455. Progress in Cryptology-INDOCRYPT 2004“. A Canteaut, K Viswanathan. 2005. Springer 5 cites.
  456. Proof-carrying proxy certificates“. W Bagga, S Crosta, R Molva. 2006. Springer SCN5 cites.
  457. Protection of mobile agent data collection by using ring signature“. HC Lin, SM Yen, HS Chen. 2004. ieeexplore.ieee.org Networking, Sensing and Control …5 cites.
  458. Reaction mechanism of HSH and CH3SH with NH2CH2COCH2X (X= F and Cl) molecules“. S Vijayakumar, P Kolandaivel. 2008. Wiley Online Library International Journal of …5 cites.
  459. Related randomness attacks for public key cryptosystems“. TH Yuen, C Zhang, SSM Chow, SM Yiu. 2015. dl.acm.org Proceedings of the 10th ACM …5 cites.
  460. Ring confidential transactions“. S Noether, A Mackenzie. 2016. ledgerjournal.org Ledger5 cites.
  461. Ring SIgnature Confidential Transactions for Monero.“. S Noether. 2015. eprint.iacr.org IACR Cryptology ePrint Archive5 cites.
  462. Round-Optimal Deniable Ring Authentication in the Presence of Big Brother.“. R Dowsley, G Hanaoka, H Imai, ACA Nascimento. 2010. Springer WISA5 cites.
  463. Securization of policy making social computing. An application to e-cognocracy“. JM Moreno-Jiménez, JJ Piles, J Ruiz, JL Salazar…. 2011. Elsevier Computers in Human …5 cites.
  464. Strong designated verifier proof signature without hash functions and the same scheme for an ad-hoc group ring“. JS Lee, JH Chang. 2006. paper.ijcsns.org International Journal of Computer Science and …5 cites.
  465. Sub-linear blind ring signatures without random oracles“. EM Ghadafi. 2013. Springer IMA International Conference on Cryptography and …5 cites.
  466. The Fiat-Shamir Transform for Group and Ring Signature Schemes.“. MF Lee, NP Smart, B Warinschi. 2010. Springer SCN5 cites.
  467. The ring authenticated encryption scheme–How to provide a clue wisely“. J Lv, K Ren, X Chen, K Kim. 2009. Elsevier Information Sciences5 cites.
  468. Theoretical computer science: essays in memory of Shimon Even“. O Goldreich, AL Rosenberg, AL Selman. 2006. Springer 5 cites.
  469. Two extensions of the ring signature scheme of Rivest–Shamir–Taumann“. Q Dong, X Li, Y Liu. 2012. Elsevier Information Sciences5 cites.
  470. A new ring signature scheme from NTRU lattice“. C Wang, H Wang. 2012. ieeexplore.ieee.org Computational and Information Sciences …4 cites.
  471. A new way to generate a ring: Universal ring signature“. R Tso. 2013. Elsevier Computers & Mathematics with Applications4 cites.
  472. A Proxy Ring Signature Scheme with Revocable Anonymity Based on Bilinear Pairings“. HQ Wang. 2010. airitilibrary.com 網際網路技術學刊4 cites.
  473. A survey on privacy preserving techniques for secure cloud storage“. S Bhagyashri, YB Gurave. 2014. academia.edu … Journal of Computer Science and Mobile …4 cites.
  474. An efficient ID-based proxy ring signature scheme“. W Lei, L Daxing. 2009. ieeexplore.ieee.org … and Mobile Computing, 2009. CMC’09. WRI …4 cites.
  475. An enhanced-security fair e-payment protocol“. W Fan, H Shu, E Fife, Q Yan. 2009. ieeexplore.ieee.org Computer Science and …4 cites.
  476. An Identity-Based Ring Signature Scheme with Constant-Size Signature [J]“. WLZ Guo-yin, M Chun-guang. 2007. en.cnki.com.cn Journal of Electronics & Information …4 cites.
  477. Anonymous proxy signature with restricted traceability“. J Wei, G Yang, Y Mu. 2014. ieeexplore.ieee.org Trust, Security and Privacy in Computing …4 cites.
  478. Anonymous signcryption in ring signature scheme over elliptic curve cryptosystem“. YF Chung, ZY Wu, FP Lai, TS Chen. 2006. atlantis-press.com Proceedings of the 9th …4 cites.
  479. Book Review“. L Massa. 2011. Wiley Online Library 4 cites.
  480. Certificate-based perfect concurrent signatures“. Z Huang, J Chen. 2010. ieeexplore.ieee.org Multimedia Information Networking and …4 cites.
  481. Certificate-free ad hoc anonymous authentication“. Z Qin, H Xiong, G Zhu, Z Chen. 2014. Elsevier Information Sciences4 cites.
  482. Certified synthesis of efficient batch verifiers“. JA Akinyele, G Barthe, B Grégoire…. 2014. ieeexplore.ieee.org … (CSF), 2014 IEEE …4 cites.
  483. Controllable ring signatures and its application to E-prosecution“. W Gao, G Wang, X Wang, D Xie. 2013. ro.uow.edu.au 4 cites.
  484. Cryptanalysis of Attribute-based Ring Signcryption Scheme.“. H Xiong, J Geng, Z Qin, G Zhu. 2015. ijns.jalaxy.com.tw IJ Network Security4 cites.
  485. Data and code integrity in Grid environments“. R Akimana, O Markowitch. 2006. wseas.us WSEAS International Conference on …4 cites.
  486. Deniable key exchanges for secure messaging“. N Unger, I Goldberg. 2015. dl.acm.org Proceedings of the 22nd ACM SIGSAC …4 cites.
  487. Efficient provable secure ID-based anonymous signcryption scheme“. J Zhang, H Chen. 2009. ieeexplore.ieee.org … and Systems, 2009. PACCS’09. Pacific …4 cites.
  488. ID Based Signature Schemes for Electronic Voting“. T Menon, R Sindhuja. 2009. ieeexplore.ieee.org Computer and Electrical Engineering …4 cites.
  489. Identity-based strong key-insulated ring signature scheme in the standard model“. H Wang, Y Zhang. 2011. ieeexplore.ieee.org Mobile Ad-hoc and Sensor Networks (MSN) …4 cites.
  490. Intro to bilinear maps“. J Bethencourt. 2006. uniroma2.it … Sciences Department, Carnegie Mellon University. http …4 cites.
  491. Investigating anonymity in group based anonymous authentication“. D Slamanig, C Stingl. 2008. Springer IFIP Summer School on the Future of Identity in the …4 cites.
  492. Key-Homomorphic Signatures and Applications to Multiparty Signatures.“. D Derler, D Slamanig. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint Archive4 cites.
  493. Method, apparatus, system, and program for creating ring signature“. Y Suga. 2004. Google Patents US Patent App. 10/761,6974 cites.
  494. Multi-key leakage-resilient threshold cryptography“. C Zhang, TH Yuen, H Xiong, SSM Chow…. 2013. dl.acm.org Proceedings of the 8th …4 cites.
  495. Non-interactive confirmer signatures“. SSM Chow, K Haralambiev. 2011. Springer Cryptographers’ Track at the RSA …4 cites.
  496. On the definitions of anonymity for ring signatures“. M Ohkubo, M Abe. 2008. jstage.jst.go.jp IEICE transactions on fundamentals of …4 cites.
  497. On the difficult tradeoff between security and privacy: Challenges for the management of digital identities“. D Arroyo, J Diaz, V Gayoso. 2015. Springer International Joint Conference4 cites.
  498. On the transferability of private signatures“. J Herranz. 2009. Elsevier Information Sciences4 cites.
  499. Policy-Controlled Signatures.“. P Thorncharoensri, W Susilo, Y Mu. 2009. Springer ICICS4 cites.
  500. Practical Traceable Anonymous Identification.“. D Slamanig, P Schartner, C Stingl. 2009. pdfs.semanticscholar.org SECRYPT4 cites.
  501. Privacy-preserving public auditing for secure cloud storage“. S Bhagyashri, YB Gurav. 2014. pdfs.semanticscholar.org IOSR Journal of Computer …4 cites.
  502. Real-world evaluation of an anonymous authenticated key agreement protocol for vehicular ad-hoc networks“. C Büttner, F Bartels, SA Huss. 2015. ieeexplore.ieee.org Wireless and Mobile Computing …4 cites.
  503. RE-NOTE: An E-voting scheme based on ring signature and clash attack protection“. H Pan, E Hou, N Ansari. 2013. ieeexplore.ieee.org Global communications conference …4 cites.
  504. Ring signature based on ElGamal signature“. J Ren, L Harn. 2006. Springer Lecture notes in computer science4 cites.
  505. Ring signatures: Universally composable definitions and constructions“. K Yoneyama, K Ohta. 2007. jstage.jst.go.jp Information and Media Technologies4 cites.
  506. Scalable deniable group key establishment“. K Neupane, R Steinwandt, AS Corona. 2012. Springer International Symposium on …4 cites.
  507. Secure and anonymous mobile ad-hoc networks“. Y Mu, F Zhang, W Susilo. 2005. ieeexplore.ieee.org Networks, 2005. Jointly held with the …4 cites.
  508. Signature schemes using bilinear mappings“. CB Gentry. 2012. Google Patents US Patent 8,180,0494 cites.
  509. Step-out group signatures“. M Klonowski, Ł Krzywiecki, M Kutyłowski, A Lauks. 2009. Springer Computing4 cites.
  510. Study of in vitro mitral valve filling flow.“. T Drost, T Zimmer, HB Kim, R Shandas…. 2004. europepmc.org Biomedical sciences …4 cites.
  511. Threshold-oriented optimistic fair exchange“. Y Wang, MH Au, JK Liu, TH Yuen, W Susilo. 2013. Springer International Conference on …4 cites.
  512. Unconditionally secure ring authentication“. R Safavi-Naini, S Wang, Y Desmedt. 2007. dl.acm.org … of the 2nd ACM symposium on …4 cites.
  513. 一种可追踪签名者的环签密方案“. 孙庆英, 吴克力, 徐会艳. 2011. 计算机工程4 cites.
  514. 基于身份的无可信中心门限环签名方案“. 李虓, 何明星, 罗大文. 2008. 计算机工程4 cites.
  515. A lattice-based designated verifier signature for cloud computing“. Y Zhang, Q Liu, C Tang, H Tian. 2015. inderscienceonline.com International Journal of …3 cites.
  516. A mobile ad hoc network public key encryption algorithm based on hash-chain“. W Feng, S Qing-wei, C Ke. 2011. Elsevier Procedia Engineering3 cites.
  517. A More Efficient Instantiation of Witness-Indistinguishable Signature.“. JK Liu, DS Wong. 2007. ijns.jalaxy.com.tw IJ Network Security3 cites.
  518. A new improved ID-based proxy ring signature scheme from bilinear pairings“. L Weimin, Y Zongkai, C Wenqing. 2006. 万方数据资源系统 Journal of Harbin Institute of …3 cites.
  519. A new verifiable ring signature scheme based on nyberg-rueppel scheme“. Z Changlun, L Yun, H Dequan. 2006. ieeexplore.ieee.org Signal Processing, 2006 8th …3 cites.
  520. A novel id-based threshold ring signature scheme competent for anonymity and anti-forgery“. YF Chung, ZY Wu, TS Chen. 2006. Springer International Conference on Computational …3 cites.
  521. A novel ring signature scheme with Multi-designated verifiers“. J Zhang, J Xie. 2008. ieeexplore.ieee.org … Intelligent Systems, 2008 IEEE Conference on3 cites.
  522. A privacy problem on Hu–Huang’s proxy key generation protocol“. H Park, S Lim, I Yie. 2009. Elsevier Computer Standards & Interfaces3 cites.
  523. A Provably Secure Certificate Based Ring Signature Without Pairing.“. Z Qin, H Xiong, F Li. 2014. pdfs.semanticscholar.org IJ Network Security3 cites.
  524. A provably secure parallel certificatelesss ring signcryption scheme“. L Zhu, F Zhang, S Miao. 2010. ieeexplore.ieee.org Multimedia Information Networking …3 cites.
  525. A Review On Multi Level Identity Based Cryptography For Secure Digital Signature Authentication“. P Sumalatha, B Sathyanarayana. 2014. ijcea.com International Journal of Computer …3 cites.
  526. A Ring Signature Scheme with Strong Designated Verifiers to Provide Signer Anonymity“. SJ Hwang, KL Cheng. 0. Workshop on Cryptography and Information Security …3 cites.
  527. A secure and practical approach for providing anonymity protection for trusted platforms“. K Dietrich, J Winter. 2010. Springer Information and Communications Security3 cites.
  528. A short identity-based proxy ring signature scheme from RSA“. MR Asaar, M Salmasizadeh, W Susilo. 2015. Elsevier Computer Standards & Interfaces3 cites.
  529. A strong designated verifier signature scheme tightly related to the LRSW assumption“. KA Shim. 2013. Taylor & Francis International Journal of Computer Mathematics3 cites.
  530. A study on efficient group-oriented signature schemes for realistic application environment“. YF Chung, TL Chen, TS Chen…. 2012. pdfs.semanticscholar.org Int. J. Innovative …3 cites.
  531. A survey of research on electronic auction“. X CHEN, Y WANG. 2002. en.cnki.com.cn Journal of China Institute of3 cites.
  532. A taxonomy of ring signature schemes: Theory and applications“. H Xiong, Z Qin, F Li. 2013. Taylor & Francis IETE Journal of Research3 cites.
  533. A viewable e-voting scheme for environments with conflict of interest“. H Li, Y Sui, W Peng, X Zou, F Li. 2013. ieeexplore.ieee.org Communications and Network …3 cites.
  534. Access control based on group signatures in cloud service“. H Zheng, Z Zhao, X Zhang. 2012. ieeexplore.ieee.org Computer Science and Automation …3 cites.
  535. Affiliation-hiding authenticated asymmetric group key agreement“. C Xu, Z Li, Y Mu, H Guo, T Guo. 2012. academic.oup.com The Computer Journal3 cites.
  536. An efficient blind ring signature scheme without pairings“. J Zhang, H Chen, X Liu, C Liu. 2010. Springer International Conference on Web-Age …3 cites.
  537. An efficient ring signature scheme from pairings“. KA Shim. 2015. Elsevier Information Sciences3 cites.
  538. An Exploration of Group and Ring Signatures“. S Meiklejohn. 2011. academia.edu UCSD Research Exam3 cites.
  539. Ancient oak climate proxies from the agricultural heartland“. RP Guyette, MC Stambaugh…. 2004. Wiley Online Library Eos, Transactions …3 cites.
  540. Anonymous authentication from public-key encryption revisited“. D Slamanig. 2011. Springer Communications and Multimedia Security3 cites.
  541. Anonymous communications in overlay networks“. J Ren, T Li, Y Li. 2008. ieeexplore.ieee.org Military Communications Conference, 2008 …3 cites.
  542. Anonymous proof of membership with ring signature“. CC Chang, T Hwang. 2005. ieeexplore.ieee.org Electro Information Technology, 2005 …3 cites.
  543. Assessing cryptographic signature schemes from a legal perspective“. DTF Chan, LCK Hui, SM Yiu. 2014. ieeexplore.ieee.org Privacy, Security and Trust (PST) …3 cites.
  544. Attribute Based Signature Scheme For Attribute Based Encrypted Data In Cloud“. R Vaishnav. 2012. pdfs.semanticscholar.org International Journal of Engineering …3 cites.
  545. Attribute-based ring signatures. ePrint, IACR“. J Li, K Kim. 0. . 3 cites.
  546. Borromean ring signatures (2015)“. G Maxwell, A Poelstra. 2015. . 3 cites.
  547. Breaking a certificateless strong designated verifier signature scheme“. J Zhang, J Xie. 2011. ieeexplore.ieee.org Consumer Electronics, Communications and …3 cites.
  548. Bringing New Elements to Bitcoin with Sidechains“. G Maxwell. 2015. people.xiph.org SF Bitcoin Devs Meetup3 cites.
  549. Certificateless ring signature based on RSA problem and DL problem“. L Deng. 2015. rairo-ita.org RAIRO-Theoretical Informatics and Applications3 cites.
  550. Compact Confidential Transactions“. D Lukianov. 2015. voxelsoft.com 3 cites.
  551. Cryptographic mechanisms for privacy“. J Camenisch, M Dubovitskaya, M Kohlweiss…. 2011. Springer Privacy and Identity …3 cites.
  552. Democratic group signatures with collective traceability“. X Li, D Zheng, K Chen, J Li. 2009. Elsevier Computers & Electrical Engineering3 cites.
  553. Democratic group signatures with threshold traceability“. X Li, H Qian, J Li. 2009. Springer Journal of Shanghai Jiaotong University (Science)3 cites.
  554. Design and Analysis of” Flexible” k-out-of-n Signatures.“. R Tso, X Yi, T Ito, T Okamoto, E Okamoto. 2010. Springer ATC3 cites.
  555. Design strategies for a privacy-friendly Austrian eID system in the public cloud“. B Zwattendorfer, D Slamanig. 2015. Elsevier Computers & Security3 cites.
  556. Efficient spatial privacy preserving scheme for sensor network“. A Debnath, P Singaravelu, S Verma. 2013. degruyter.com Open Engineering3 cites.
  557. Flexible multi-authority attribute-based signature schemes for expressive policy“. D Cao, B Zhao, X Wang, J Su. 2012. content.iospress.com Mobile Information Systems3 cites.
  558. Fully deniable message authentication protocols preserving confidentiality“. L Harn, CY Lee, C Lin, CC Chang. 2011. academic.oup.com The Computer Journal3 cites.
  559. IAA: incentive-based anonymous authentication scheme in smart grids“. Z Sui, A Alyousef, H de Meer. 2015. Springer International Conference on Internet …3 cites.
  560. ID-based ring proxy signatures“. B Wei, F Zhang, X Chen. 2007. ieeexplore.ieee.org Information Theory, 2007. ISIT 2007 …3 cites.
  561. Identity-based quotable ring signature“. K Wang, Y Mu, W Susilo. 2015. Elsevier Information Sciences3 cites.
  562. Identity-based ring signature from lattice basis delegation“. J Wang. 2008. pdfs.semanticscholar.org Beijing: Tsinghua University3 cites.
  563. IPv6 网络中的路由蠕虫传播模型倡“. 徐延贵, 钱焕延, 李华峰. 2009. arocmag.com 计算机应用研究3 cites.
  564. Lattice-based ring signature scheme under the random oracle model“. S Wang. 2014. arxiv.org arXiv preprint arXiv:1405.31773 cites.
  565. Method for representing objects with concentric ring signature descriptors for detecting 3D objects in range images“. F Porikli, H Nguyen. 2012. Google Patents US Patent 8,274,5083 cites.
  566. Multi-party concurrent signatures based on short ring signatures“. L Wang. 2010. ieeexplore.ieee.org … , Networking and Information Security (WCNIS), 2010 …3 cites.
  567. Non-conventional Digital Signatures and Their Implementations—A Review“. D Arroyo, J Diaz, FB Rodriguez. 2015. Springer International Joint Conference3 cites.
  568. Non-interactive deniable ring signatures“. W Susilo, Y Mu. 2003. the 6th International Conference on Information …3 cites.
  569. On the use of key assignment schemes in authentication protocols“. J Alderman, J Crampton. 2013. Springer … Conference on Network and System Security3 cites.
  570. Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures“. Y Wang, Q Wu, B Qin, X Chen, X Huang…. 2016. Springer Peer-to-Peer Networking …3 cites.
  571. Preface“. H Rott, C Mätzler. 1989. Pergamon 3 cites.
  572. Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies“. M Borge, E Kokoris-Kogias, P Jovanovic…. 2017. ieeexplore.ieee.org Security and Privacy …3 cites.
  573. Purpose-restricted anonymous mobile communications using anonymous signatures in online credential systems“. H Fathi, SH Shin, K Kobara, H Imai. 2010. Springer Wireless personal communications3 cites.
  574. Relinkable ring signature“. K Suzuki, F Hoshino, T Kobayashi. 2009. Springer International Conference on …3 cites.
  575. SA 3: Self-adaptive anonymous authentication for dynamic authentication policies“. Y Lian, X Huang, Y Mu. 2014. Elsevier Future Generation Computer Systems3 cites.
  576. SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE“. DGK Kamalam, B Neka…. 2015. pdfs.semanticscholar.org International Journal of …3 cites.
  577. Signature schemes using bilinear mappings“. CB Gentry. 2010. Google Patents US Patent 7,814,3263 cites.
  578. Smart Card Research and Advanced Applications VI: IFIP 18th World Computer Congress TC8/WG8. 8 & TC11/WG11. 2 Sixth International Conference on …“. JJ Quisquater, P Paradinas, Y Deswarte, AA El Kalam. 2006. books.google.com 3 cites.
  579. Stretching groth-sahai: NIZK proofs of partial satisfiability“. C Ràfols. 2015. Springer Theory of Cryptography Conference3 cites.
  580. Sub-linear Blind Ring Signatures without Random Oracles“. G ESSAM. 2013. Proceedings of the 14th IMA International Conference …3 cites.
  581. Sub-linear size traceable ring signatures without random oracles“. E Fujisaki. 2012. search.ieice.org … on Fundamentals of Electronics, Communications and …3 cites.
  582. Tezos: A Self-Amending Crypto-Ledger Position Paper“. LM Goodman. 2014. tezos.com 3 cites.
  583. The security and the credibility challenges in E-voting systems“. A Rana, I Zincir, S Basarici. 2015. books.google.com European Conference on Cyber …3 cites.
  584. Threshold anonymous credential system.“. K Fung, TK Chan, JK Liu, DS Wong. 2004. researchgate.net WSEAS Transactions on …3 cites.
  585. Towards self-organized location privacy in mobile networks“. J Freudiger, M Raya, JP Hubaux. 2008. infoscience.epfl.ch 3 cites.
  586. Unique aggregate signatures with applications to distributed verifiable random functions“. V Kuchta, M Manulis. 2013. Springer … Conference on Cryptology and Network Security3 cites.
  587. Universal designated verifier signatures with threshold-signers“. P Thorncharoensri, W Susilo, Y Mu. 2009. Springer International Workshop on Security3 cites.
  588. Unlinkable content playbacks in a multiparty DRM system“. R Petrlic, S Sekula. 2013. Springer IFIP Annual Conference on Data and Applications …3 cites.
  589. A constant-size linkable ring signature scheme for e-cash protocol“. P Liu, C Hu. 2010. ieeexplore.ieee.org … Engineering and Technology (ICCET), 2010 2nd …2 cites.
  590. A New Construction of Time Capsule Signature.“. M Zhang, G Chen, J Li, L Wang…. 2006. pdfs.semanticscholar.org IACR Cryptology …2 cites.
  591. A new framework for conditionally anonymous ring signature“. S Zeng, S Jiang. 2013. academic.oup.com The Computer Journal2 cites.
  592. A new ID-based ring signature scheme with constant-size signature“. C Hu, P Liu. 2010. ieeexplore.ieee.org … Engineering and Technology (ICCET), 2010 2nd …2 cites.
  593. A new identity-based threshold ring signature scheme“. F Xu, X Lv. 2011. ieeexplore.ieee.org Systems, Man, and Cybernetics (SMC), 2011 IEEE …2 cites.
  594. A new multivariate-based ring signature scheme“. LL Wang. 2013. Trans Tech Publ Applied Mechanics and Materials2 cites.
  595. A note on chain reactions in traceability in cryptonote 2.0“. S Noether, A Mackenzie. 2014. bravenewcoin.com Technical report2 cites.
  596. A Novel Id-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-Forgery“. ZY Wu, FG Jeng, TS Chen. 2006. ieeexplore.ieee.org Computational Intelligence and …2 cites.
  597. A provably secure identity‐based proxy ring signature based on RSA“. MR Asaar, M Salmasizadeh…. 2015. Wiley Online Library Security and …2 cites.
  598. A ring signature scheme over braid groups“. Y Wei, G Xiong, W Bao, X Zhang. 2010. Springer Journal of Electronics (China)2 cites.
  599. A Secure Publicly Verifiable Auction Scheme [J]“. C YE, M ZHANG, T WU, H DU. 2008. en.cnki.com.cn Microelectronics & Computer2 cites.
  600. A traceable optimistic fair exchange protocol“. R Ganjavi, MR Asaar…. 2014. ieeexplore.ieee.org Information Security and …2 cites.
  601. AATCT: Anonymously authenticated transmission on the cloud with traceability“. MH Ibrahim. 2015. researchgate.net … Journal of Advanced Computer Science & …2 cites.
  602. An automotive distributed mobile sensor data collection with machine learning based data fusion and analysis on a central backend system“. T Tiedemann, C Backe, T Vögele, P Conradi. 2016. Elsevier Procedia Technology2 cites.
  603. An efficient attribute-based signature scheme with claim-predicate mechanism“. C Wang, W Li. 2013. inderscienceonline.com International Journal of Grid and Utility …2 cites.
  604. An efficient t-times proxy ring signature scheme with revocable anonymity“. J Zhang, H Chen. 2011. ieeexplore.ieee.org … Software and Networks (ICCSN), 2011 IEEE …2 cites.
  605. An eVoting platform for QoE evaluation“. JL Tornos, JL Salazar, JJ Piles. 2013. ieeexplore.ieee.org … Network Management (IM …2 cites.
  606. An evoting system based on ring signatures“. JL Tornos, JL Salazar, JJ Piles, J Saldana…. 2014. macrothink.org Network Protocols …2 cites.
  607. An Improved Identity-Based Ring Signcryption Scheme“. L Deng, C Liu, X Wang. 2013. Taylor & Francis Information Security Journal: A Global …2 cites.
  608. AN IMPROVED PROTOCOL OF ELECTRICAL AUCTION WITH SEALED BIDS [J]“. CXZFW Yumin. 2002. en.cnki.com.cn Journal of Electronics and Information Technology2 cites.
  609. Anonymity and security in mobile Ad hoc networks“. J Bolla, V Vatsavayi, J Murthy. 2012. Springer Distributed Computing and Internet …2 cites.
  610. Another Efficient Identity-Based Ring Signature Scheme and Its Extension“. J Zhang, J Cheng. 2007. ieeexplore.ieee.org Data, Privacy, and E-Commerce, 2007 …2 cites.
  611. Application of herb chronology: Annual fertilization and climate reveal annual ring signatures within the roots of US tallgrass prairie plants“. JR Dee, MW Palmer. 2016. NRC Research Press Botany2 cites.
  612. Attribute-based authentication schemes: a survey“. H Yang, V Oleshchuk. 2015. computingonline.net International Journal of Computing2 cites.
  613. Black-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds.“. E Käsper, S Laur, H Lipmaa. 2006. eprint.iacr.org IACR Cryptology ePrint Archive2 cites.
  614. Blind ring signatures secure under the chosen-target-CDH assumption information security“. H Javier, L Fabien. 2006. springer-verlag LNCS2 cites.
  615. Brush scrubbing scratches reduction methods in post CMP cleaning“. H Soondrum. 2012. ma.ecsdl.org Meeting Abstracts2 cites.
  616. Certificateless ring signature scheme from anonymous subsets“. H Wang. 2010. ieeexplore.ieee.org … Information Networking and Security (MINES), 2010 …2 cites.
  617. Charge Fractionalization in a Mesoscopic Ring“. W DeGottardi, S Lal, S Vishveshwara. 2013. APS Physical review letters2 cites.
  618. Cloud Data Auditing Techniques with a Focus on Privacy and Security“. M Kolhar, MM Abu-Alhaj, SMA El-atty. 2017. ieeexplore.ieee.org IEEE Security & Privacy2 cites.
  619. Collusion-resistant convertible ring signature schemes“. JY Hwang, KY Chang, HS Cho, B Song…. 2015. Springer Science China Information …2 cites.
  620. Computational and Symbolic Anonymity in an Unbounded Network“. H Comon-Lundh, Y Kawamoto, H Sakurada. 2009. jstage.jst.go.jp JSIAM Letters2 cites.
  621. Concentric Ring Signature (CORS) for 3D Object Detection Recognition, and Registration“. H Van Nguyen, F Porikli. 2011. Elsevier Pattern Recognition,2 cites.
  622. Constant size ring signature without random oracle“. P Bose, D Das, CP Rangan. 2015. Springer Australasian Conference on Information …2 cites.
  623. Contract Net Model Based on Bit Commitment [J]“. W WAN, W SUO, Y CHEN. 2009. en.cnki.com.cn Computer Engineering2 cites.
  624. Convertible Perfect Concurrent Signature Protocol“. H Jiang, Q Xu, C Zhang. 2010. ieeexplore.ieee.org Computational Intelligence and …2 cites.
  625. Convertible ring signatures with gradual revelation of non‐signers“. R Tso. 2012. Wiley Online Library Security and Communication Networks2 cites.
  626. Cryptanalysis and improvement of a concurrent signature scheme based on identity“. Z Zhang, S Xu. 2011. ieeexplore.ieee.org … and Service Science (ICSESS), 2011 IEEE …2 cites.
  627. Cryptanalysis and improvement of a ring signature based on ElGamal signature“. H Wang, S Han, C Deng…. 2009. ieeexplore.ieee.org … Engineering, 2009. WCSE’ …2 cites.
  628. Cryptanalysis of several linkable ring signature schemes“. H Wang, S Zhao. 2010. ieeexplore.ieee.org Networks Security Wireless Communications …2 cites.
  629. Crypto-Book: Bootstrapping Privacy Preserving Online Identities from Social Networks“. J Maheswaran, D Jackowitz, DI Wolinsky…. 2014. arxiv.org arXiv preprint arXiv …2 cites.
  630. Data Sharing in Cloud Using Identity Based Ring Signature“. N Shirsath Priyanka, K BECOMP. 2015. irjet.net International Research Journal of …2 cites.
  631. Decentralized access control with Anonymous authentication of data stored in cloud“. CMSR Krishna, GJ Samuel. 2016. ijitech.org 2 cites.
  632. Design and Evaluation for a Multi-Cloud Based Storage System with Privacy Preserving“. Y Fan, Z Qiao, M Xiao. 2014. ieeexplore.ieee.org … , and Storage (NAS), 2014 9th IEEE …2 cites.
  633. Distributed anonymized communications“. R Hodgman, ME Van Dijk, E Kolman. 2015. Google Patents US Patent 9,015,2312 cites.
  634. Efficient and random oracle-free conditionally anonymous ring signature“. S Zeng, Z Qin, Q Lu, Q Li. 2012. Springer International Conference on Provable Security2 cites.
  635. English Auction Protocol Based on Ring Signatures [J]“. WU Ke-li. 2006. en.cnki.com.cn Computer Engineering and Applications2 cites.
  636. Escrowed linkability of ring signatures and its applications. VIETCRYPT 2006, LNCS vol. 4341“. S Chow, W Susilo, TH Yuen. 2006. Springer 2 cites.
  637. Fast object recognition using a hybrid optical/digital processor.“. DJF Walker, CR Chatwin. 1990. pdfs.semanticscholar.org BMVC2 cites.
  638. Forward-secure traceable ring signature“. C Hu, D Li. 2007. ieeexplore.ieee.org … , and Parallel/Distributed Computing, 2007. SNPD …2 cites.
  639. Generation and Tate pairing computation of ordinary elliptic curves with embedding degree one“. Z Hu, L Wang, M Xu, G Zhang. 2013. Springer International Conference on Information …2 cites.
  640. Group signature with deniability: how to disavow a signature“. A Ishida, K Emura, G Hanaoka, Y Sakai…. 2017. search.ieice.org … on Fundamentals of …2 cites.
  641. ID-based ring signatures for general families of signing subsets“. J Herranz, G Sáez. 2005. Submitted 2 cites.
  642. ID-based Threshold Ring Signature Scheme Without Trusted Party [J]“. X LI, M HE, D LUO. 2008. en.cnki.com.cn Computer Engineering2 cites.
  643. Identity-based directed proxy ring signature scheme“. KA Ajmath, PV Reddy, BU Rao…. 2012. Taylor & Francis Journal of Discrete …2 cites.
  644. Identity-Based Ring Signatures fromRSA“. I Javier Herranz. 0. Artificial Intelligence Research Institute, CSIC, Spanish …2 cites.
  645. Identity-based threshold ring signcryption from pairing“. L Deng, S Li, Y Yu. 2014. inderscienceonline.com International Journal of Electronic …2 cites.
  646. J. stern, M. Szydlo, Threshold Ring Signatures and Applications to Ad-hoc Groups, LNCS, CRYTO 2002“. E Bresson. 2002. Berlin: Springer-Verlag 2 cites.
  647. Key Agreement from Signatures: Improved Protocols and Anonymous Extension“. S Chow, KK Choo. 2007. researchgate.net 2 cites.
  648. Laribus: privacy-preserving detection of fake SSL certificates with a social P2P notary network“. A Micheloni, KP Fuchs, D Herrmann…. 2013. ieeexplore.ieee.org … and Security (ARES) …2 cites.
  649. Linkable and culpable ring signatures“. JK Liu, VK Wei, DS Wong. 2003. Manuscript 2 cites.
  650. Logarithmic size ring signatures without random oracles“. C Gritti, W Susilo, T Plantard. 2016. IET IET Information Security2 cites.
  651. Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin.“. T Ruffing, P Moreno-Sanchez. 2017. fc17.ifca.ai IACR Cryptology ePrint Archive2 cites.
  652. New Distributed Ring Signatures for General Families of Signing Subsets.“. J Herranz, G Sáez. 2004. eprint.iacr.org IACR Cryptology ePrint Archive2 cites.
  653. Non‐interactive deniable ring signature without random oracles“. S Zeng, Q Li, Z Qin, Q Lu. 2016. Wiley Online Library Security and Communication …2 cites.
  654. Non‐interactive deniable ring signature without random oracles“. S Zeng, Q Li, Z Qin, Q Lu. 2016. Wiley Online Library Security and Communication …2 cites.
  655. On Privacy and Integrity in Vehicular Ad hoc Networks.“. P Caballero-Gil, C Caballero-Gil, J Molina-Gil…. 2010. researchgate.net ICWN2 cites.
  656. On Privacy Losses in the Trusted Agent Model“. P Mateus, S Vaudenay. 2009. infoscience.epfl.ch EUROCRYPT” 092 cites.
  657. Online/Off-line Ring Signature Scheme with Provable Security.“. J Kar. 2015. eprint.iacr.org ISI2 cites.
  658. PPAA: Peer-to-peer anonymous authentication (extended version)“. PP Tsang, SW Smith. 2008. pdfs.semanticscholar.org 2 cites.
  659. Privacy in Mobile Ad Hoc Networks“. BJ Vazram, VV Kumari, JVR Murthy. 2011. Springer Advances in Digital Image …2 cites.
  660. Progress in Cryptology-VIETCRYPT 2006“. PQ Nguyen. 2006. Springer 2 cites.
  661. Proof of signer and privacy revocation in ring signatures“. H Kikuchi. 2003. ci.nii.ac.jp 4th International Workshop on Information Security …2 cites.
  662. Public audit of cloud shared data by using efficient privacy preserving scheme“. F Malugu, KS Babu. 2015. ijser.in Journal of Scientific Engineering and Research2 cites.
  663. Relaxed security notions for signatures of knowledge“. M Fischlin, C Onete. 2011. Springer … Conference on Applied Cryptography and Network …2 cites.
  664. Review of CryptoNote white paper“. S Noether. 2014. bravenewcoin.com … http://monero. cc/downloads/whitepaper_review. pdf …2 cites.
  665. Ring group signatures“. L Chen. 2012. ieeexplore.ieee.org Trust, Security and Privacy in Computing and …2 cites.
  666. Scheme on user identity attribute preserving based on ring signcryption for cloud computing“. L Shuan-bao, F Jian-ming, Z Huan-guo…. 2014. chinacloud.cn Journal on …2 cites.
  667. Secure anonymously authenticated and traceable enterprise DRM system“. MH Ibrahim. 2015. search.proquest.com International Journal of Computer Applications2 cites.
  668. Self-certified ring signatures“. N Li, Y Mu, W Susilo, F Guo. 2011. dl.acm.org Proceedings of the 6th ACM Symposium …2 cites.
  669. Self-proved ring signatures and Ring Sign-Cryption Algorithm in Mobile ad hoc network [D]“. F You-miao. 2005. He Fei: University of science and technology of China …2 cites.
  670. Separable identity-based deniable authentication: cryptographic primitive for fighting phishing“. W Susilo, Y Mu. 2006. Springer European Public Key Infrastructure Workshop2 cites.
  671. Short (resp. Fast) CCA2-Fully-Anonymous Group Signatures using IND-CPA-Encrypted Escrows.“. VK Wei. 2005. pdfs.semanticscholar.org IACR Cryptology ePrint Archive2 cites.
  672. Short linkable ring signatures f0r E—voting, E cash and attestation“. PP Tsang, VK Wei. 0. Pine. First lnfor—marion Security Practice and …2 cites.
  673. Signer-traceable Ring Signcryption Scheme [J]“. QY Sun, KL Wu, HY Xu. 2011. en.cnki.com.cn Computer Engineering2 cites.
  674. Study on ring signature and its application“. X Zhou. 2009. ieeexplore.ieee.org Control and Decision Conference, 2009. CCDC’09 …2 cites.
  675. Survey on privacy preserving public auditing techniques for shared data in the cloud“. KJ Rasal, DSV Gumaste, SA Kahate. 2015. ijesit.com Journal of Engineering Science and …2 cites.
  676. The Degree of Privacy in Web-based Electronic Health Records“. D Slamanig, C Stingl. 2009. Springer 4th European Conference of the International …2 cites.
  677. The Yellowstone Petrified Forests“. JD Morris. 1995. slservicios.com 2 cites.
  678. Threshold ring signatures for ad-hoc groups, Crypto’02, LNCS 2442“. E Bresson, J Stem, M Szydlo. 2002. Springer-Verlag 2 cites.
  679. Toward the fair anonymous signatures: deniable ring signatures“. Y Komano, K Ohta, A Shimbo…. 2007. search.ieice.org IEICE Transactions on …2 cites.
  680. Towards Unconditional Anonymity: Privacy Enforcement Model in Web Services“. Y Yang, J Yang. 2008. ieeexplore.ieee.org Congress on Services Part II, 2008 …2 cites.
  681. Two Stories of Ring Signatures. Crypto 2005 rump session talk“. Y Hanatani, K Ohta. 2005. . 2 cites.
  682. Uncorrelatable electronic transactions using ring signatures“. PD Chowdhury, B Christianson. 2004. researchgate.net Proceedings of the Wholes …2 cites.
  683. Using resultants for SAGBI basis verification in the univariate polynomial ring“. A Torstensson, V Ufnarovski, H Öfverbeck. 2005. Elsevier Journal of Symbolic …2 cites.
  684. 唱 16.[12] CHOW S SM, WEI UK, LIU JK, et al“. 唱VerlagSpringer. 0. Ring signatures without ran 唱, 12 cites.
  685. 基于环 Zn 上圆锥曲线的前向安全环签名方案“. 王玲玲, 张国印, 马春光. 2008. 计算机工程2 cites.
  686. 基于身份的可链接和可转换环签名“. 王少辉, 郑世慧, 展涛. 2008. jeit.ie.ac.cn 电子与信息学报2 cites.
  687. 基于身份的可链接和可转换环签名“. 王少辉, 郑世慧, 展涛. 2008. jeit.ie.ac.cn 电子与信息学报2 cites.
  688. 改进的标准模型下的基于身份的环签名方案倡“. 程文华, 王彩芬, 韩亚宁, 张玉磊. 2009. arocmag.com 计算机应用研究2 cites.
  689. (Strong) multidesignated verifiers signatures secure against rogue key attack“. MH Au, G Yang, W Susilo…. 2014. Wiley Online Library … and Computation: Practice …1 cites.
  690. A dendrochronological assessment of two tree species to reconstruct climate on the Fraser Plateau, British Columbia“. Z Gedalof, R Au, B Blundon, G Carnwath…. 2008. researchgate.net Report on the 18th …1 cites.
  691. A Forward-secure Anonymity Signature Scheme Based on Ring Signature Idea [J]“. ZZMAO Ming. 2010. en.cnki.com.cn Microcomputer Information1 cites.
  692. A linkable and convertible ID-based ring signature“. X Shen, M Xu, Y Zhao. 2011. ieeexplore.ieee.org Computational and Information …1 cites.
  693. A new identity-based ring signcryption scheme“. L Deng, J Zeng, S Li. 2014. inderscienceonline.com International Journal of Electronic …1 cites.
  694. A Note on Shacham and Waters Ring Signatures“. P Wei, M Wang, W Wang. 2007. ieeexplore.ieee.org Computational Intelligence and …1 cites.
  695. A Privacy Preserving of Composite Private/Public Key in Cloud Servers“. OS Nagesh. 2014. ijcttjournal.org International Journal of Computer Trends and …1 cites.
  696. A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience.“. H Wang, Q Wu, B Qin, F Zhang, J Domingo-Ferrer. 2014. books.google.com ISPEC1 cites.
  697. A reputation system supporting unlinkable, yet authorized expert ratings“. A Kokoschka, R Petrlic, C Sorge. 2015. dl.acm.org Proceedings of the 30th Annual ACM …1 cites.
  698. A Review on Implementation of Message Authentication Scheme for Elliptic Curve Cryptography in Wireless Sensor Networks“. M Ghonge, MS Kale. 2016. ijsrset.com International Journal of Scientific Research in …1 cites.
  699. A Scheme of Electronic Auction Based on Ring Signature [J]“. W Xiao-ming. 2011. en.cnki.com.cn Computer Knowledge and Technology1 cites.
  700. A Strong Designated Verifier Ring Signcryption Scheme Providing Strongest Signers’ Anonymity.“. SJ Hwang, JY Chen. 2014. pdfs.semanticscholar.org J. Inf. Sci. Eng.1 cites.
  701. A Strong Designated-Verifier Ring Signature Scheme Providing One-Out-of-All Signer Anonymity“. SJ Hwang, KL Cheng. 2011. airitilibrary.com 網際網路技術學刊1 cites.
  702. A Strong Designated-Verifier Ring Signature Scheme Providing One-Out-of-All Signer Anonymity“. SJ Hwang, KL Cheng. 2011. airitilibrary.com 網際網路技術學刊1 cites.
  703. A survey of ring signature“. LWGZ Chunguang. 0. 万方数据资源系统1 cites.
  704. An attribute-based anonymous authentication scheme“. W Hongbin, R Yan. 2013. ieeexplore.ieee.org Emerging Intelligent Data and Web …1 cites.
  705. An attribute-based ring signature scheme in lattice“. W Li, M Fan, Z Jia. 2012. Springer Wuhan University Journal of Natural Sciences1 cites.
  706. An Efficient Anonymous Authenticated Key Agreement Protocol for Vehicular Ad-Hoc Networks Based on Ring Signatures and the Elliptic Curve Integrated Encryption …“. C Büttner, SA Huss. 2015. Springer … Conference on Information Systems Security and …1 cites.
  707. An efficient certificateless ring signature scheme“. L Zhu, F Zhang. 2008. Springer Wuhan University Journal of Natural Sciences1 cites.
  708. An improved ring signature scheme without trusted key generation center for wireless sensor network“. J Xiao, G Zeng. 2009. Springer Journal of Shanghai Jiaotong University (Science)1 cites.
  709. An investigation into Confidential Transactions.“. A Gibson. 2016. pdfs.semanticscholar.org h ttps://github. com/AdamISZ …1 cites.
  710. Analysis and Improvement of Ring Signature Scheme Based on Quadratic Residues“. F WANG, L WEI, W GAO. 2012. en.cnki.com.cn Journal of Jiamusi University (Natural …1 cites.
  711. Analysis and Improvement of Ring Signature Scheme Based on Quadratic Residues“. F WANG, L WEI, W GAO. 2012. en.cnki.com.cn Journal of Jiamusi University (Natural …1 cites.
  712. Analysis on the t-out-of-n Ring Signatures from Discrete Logarithm Public Keys“. J Shang, Q Xu, H Jiang. 2006. GAI-KAN BIAJIBU MINIMICRO SYSTEMS-SHENYANG-1 cites.
  713. Anonymity-preserving identity-based multisignature scheme with provision for origin Self-Revelation“. W Goh, CK Yeo. 2013. ieeexplore.ieee.org Global Communications Conference …1 cites.
  714. Anonymizable signature and its construction from pairings“. F Hoshino, T Kobayashi, K Suzuki. 2010. Springer International Conference on Pairing …1 cites.
  715. Anonymous Communication Protocol in Overlay Networks“. J Ren, T Li, K Han. 2008. ieeexplore.ieee.org … . ICC’08. IEEE International Conference on1 cites.
  716. Anonymous evaluation system“. K Kluczniak, L Hanzlik, P Kubiak…. 2015. Springer … Conference on Network …1 cites.
  717. Applications of pairings in grid security“. A Saxena, B Soh. 2006. ieeexplore.ieee.org Communication System Software and …1 cites.
  718. Attribute-based ring signatures: Security analysis and a new construction“. R Toluee, MR Asaar…. 2013. ieeexplore.ieee.org Information Security and …1 cites.
  719. Breaking a proxy ring signature with revocable anonymity in MINE2009“. J Zhang, H Chen. 2010. ieeexplore.ieee.org … and Digital Society (ICNDS), 2010 2nd …1 cites.
  720. Building privacy-preserving cryptographic credentials from federated online identities“. J Maheswaran, D Jackowitz, E Zhai…. 2016. dl.acm.org Proceedings of the …1 cites.
  721. Certificateless Ring Signature Scheme without Pairing [J]“. T YU, Z ZHAO, X REN. 2012. en.cnki.com.cn Journal of Hangzhou Dianzi University1 cites.
  722. Concurrent Signatures without a Conventional Keystone“. Y Mu, D Wong, L Chen, W Susilo…. 2008. books.google.com Proceedings of the First …1 cites.
  723. Contributions of dendrochronology to flood hazard analysis in the Red River Basin, Manitoba“. SS George, E Nielsen. 0. manitoba.ca1 cites.
  724. Cramer–Damgård signatures revisited: Efficient flat-tree signatures based on factoring“. D Catalano, R Gennaro. 2007. Elsevier Theoretical computer science1 cites.
  725. Cryptographic privacy enhancing technologies“. LD Nguyen. 2005. ro.uow.edu.au 1 cites.
  726. Dendrochronology of submerged Bulgarian sites“. PI Kuniholm, MW Newton, B Kromer. 2007. Springer The Black Sea Flood Question …1 cites.
  727. Dual Construction of Stern-based Signature Schemes“. PL Cayrel, SMEY Alaoui. 2010. tk.informatik.tu-darmstadt.de World Academy of Science …1 cites.
  728. Efficient Light-weight Proxy Ring Signature Scheme For VANETs“. J Zhang, L Liu, M Xu, Y Cui. 2012. Advanced Institutes of Convergence … International …1 cites.
  729. Efficient linkable ring signatures and threshold signatures from linear feedback shift register“. X Li, D Zheng, K Chen. 2007. Springer … Conference on Algorithms and Architectures for …1 cites.
  730. Efficient Multivariate Ring Signature Schemes.“. MSE Mohamed, A Petzoldt. 2017. eprint.iacr.org IACR Cryptology ePrint Archive1 cites.
  731. Efficient ring signature schemes over NTRU Lattices“. YH Zhang, Y Hu, J Xie, M Jiang. 2016. Wiley Online Library Security and Communication …1 cites.
  732. Efficient ways of prime number generation for ring signatures“. JL Salazar, JL Tornos, JJ Piles. 2016. IET IET Information Security1 cites.
  733. Enhanced Ring Signatures Schemes for Privacy Preservation in Wireless Sensor Networks“. S Mishra, M Pandey. 2014. search.proquest.com International Journal of Modern …1 cites.
  734. Financial Cryptography and Data Security: 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers“. AR Sadeghi. 2013. books.google.com 1 cites.
  735. Forcing out a confession: Threshold discernible ring signatures“. S Kumar, S Agrawal, R Venkatesan…. 2010. ieeexplore.ieee.org … ), Proceedings of the …1 cites.
  736. Forking lemmas in the ring signatures’ seena—rio“. J Herranz, G Sáez. 0. eprint.iacr.org 2003—04—101 cites.
  737. Forward secure identity based ring signature scheme for images“. SN Saranya, P Thilagavathi, M Tharani. 2015. Citeseer Int. J. Adv. Info. Comm. Tech.1 cites.
  738. Hard invalidation of electronic signatures“. L Hanzlik, M Kutyłowski, M Yung. 2015. Springer Information Security Practice and …1 cites.
  739. Hierarchical ring signatures“. L Krzywiecki, M Kutylowski…. 2009. kutylowski.im.pwr.wroc.pl Slides presented at’ …1 cites.
  740. How to Leak a Secret and Reap the Rewards too“. V Saraswat, SK Pandey. 2014. Springer … on Cryptology and Information Security in Latin …1 cites.
  741. Identity Based Proxy Signature from RSA without Pairings.“. L Deng, H Huang, Y Qu. 2017. pdfs.semanticscholar.org IJ Network Security1 cites.
  742. Improved blind signature schemes based on XTR system [J]“. X DING, Z FU, S ZHANG. 2008. en.cnki.com.cn Journal of Computer Applications1 cites.
  743. Improved ID-based ring signature scheme with constant-size signatures“. H Li, X Li, M He, S Zeng. 2011. informatica.si Informatica1 cites.
  744. Improved lattice-based ring signature schemes from basis delegation“. G Wen, H Yupu, W Baocang, X Jia. 2016. Elsevier The Journal of China Universities of …1 cites.
  745. Improving Obfuscation in the CryptoNote Protocol“. A Mackenzie, S Noether, MC Team. 2015. bravenewcoin.com 1 cites.
  746. Information Security Practice and Experience: 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings“. X Huang, J Zhou. 2014. books.google.com 1 cites.
  747. Information Security: 9th International Conference; ISC 2006, Samos Island, Greece, August 30-September 2, 2006, Proceedings“. SK Katsikas, M Backes, S Gritzalis, B Preneel. 2006. books.google.com 1 cites.
  748. Legally fair contract signing without keystones“. H Ferradi, R Géraud, D Maimuț, D Naccache…. 2016. Springer … Conference on Applied …1 cites.
  749. Limited-linkable Group Signatures with Distributed-Trust Traceability“. C Hlauschek, J Black, G Vigna, C Kruegel. 2012. researchgate.net 1 cites.
  750. Maintaining unlinkability in group based P2P environments“. J Arnedo-Moreno…. 2009. ieeexplore.ieee.org … , 2009. WETICE’09. 18th …1 cites.
  751. Monero is Not That Mysterious“. S Noether, S Noether. 2014. lab.getmonero.org 1 cites.
  752. Multi authority attribute based encryption against data integrity and scalability issues in cloud data services“. A Praveena, C Sasikala. 2015. ieeexplore.ieee.org Innovations in Information …1 cites.
  753. Multi-ring signatures of the oscillation in a water Cherenkov detector“. AE Asratyan, GV Davidenko, AG Dolgolenko…. 2003. Springer The European Physical …1 cites.
  754. New Certificateless Blind Ring Signature Scheme“. H Sun. 2014. iaescore.com Indonesian Journal of Electrical Engineering and …1 cites.
  755. Nonlinear blind channel equalization via ring decision feedback“. BP Paris, H Chen. 1998. ieeexplore.ieee.org Information Theory, 1998. Proceedings …1 cites.
  756. Notions of Deniable Message Authentication“. M Fischlin, S Mazaheri. 2015. dl.acm.org Proceedings of the 14th ACM Workshop on …1 cites.
  757. On Secure Group Admission Control Using ICMetrics“. H Tahir, G Howells, H Hu, D Gu…. 2014. ieeexplore.ieee.org … (EST), 2014 Fifth …1 cites.
  758. On the Security of a Lattice-Based Multi-party Concurrent Signature Scheme“. X Mao, K Chen, L Wang, Y Long. 2014. ieeexplore.ieee.org Intelligent Networking and …1 cites.
  759. On the security of an enhanced ID-based anonymous proxy signature scheme in ICCAE2010“. J Zhang, Y Xu. 2012. ieeexplore.ieee.org … and Collaborative Systems (INCoS), 2012 4th …1 cites.
  760. One-time zero sum ring signature“. C Fromknecht. 2016. scalingbitcoin.org 1 cites.
  761. Optimized coke cutting method for decoking substantially free-flowing coke in delayed cokers“. GE Phillips, CJ Mart. 2010. Google Patents US Patent 7,815,7751 cites.
  762. Periodic Updation in TPA for Secure Dynamic Audit Services of Outsourced Storages in Clouds“. NS Priya. 2015. jncet.org Journal of Network Communications and Emerging …1 cites.
  763. POSTER: Deniable Anonymous Group Authentication“. E Syta, B Ford. 2013. ieee-security.org Proceedings of the IEEE Symposium on Security …1 cites.
  764. Privacy-preserving PKIs with reduced server trust“. G Di Crescenzo, T Zhang. 2012. ieeexplore.ieee.org Communications (ICC), 2012 IEEE …1 cites.
  765. Reconstruction of debris-flow dynamics and triggers since AD 1570–Looking back to a decade of tree-ring research at Ritigraben (Valais, Switzerland) …“. M Stoffel. 2011. ijege.uniroma1.it 5th International Conference on Debris-Flow Hazards …1 cites.
  766. Remote Attestation on Trusted Cloud Computing“. BL Yang, H Guo. 2015. Trans Tech Publ Applied Mechanics and Materials1 cites.
  767. Research and implementation of highly-efficient anonymous electronic voting scheme based on ring signature and blind signature“. Y Yaojun, H Haiyan. 2012. ieeexplore.ieee.org World Automation Congress (WAC) …1 cites.
  768. Ring signature with divided private key.“. S Flonta, LC Miclea. 2010. eprint.iacr.org IACR Cryptology ePrint Archive1 cites.
  769. Ring Signature with Weak Linkability and its Application“. I Rae, J Ok, D Hoon. 0. IEEE Trans1 cites.
  770. Ring signatures based homomorphic authentication for public auditing in Cloud“. P Rahul, T Malathi, S Archana. 2015. ijraet.com Advanced Engineering Technologies1 cites.
  771. Schnorr ring signature scheme with designated revocability“. X Lv, Z Wang, F Qian, F Xu. 2012. Taylor & Francis Intelligent Automation & Soft …1 cites.
  772. Secure efficient history-hiding append-only signatures in the standard model“. B Libert, M Joye, M Yung, T Peters. 2015. Springer IACR International Workshop on …1 cites.
  773. Security technologies and applications for convergence environments“. JJ Park, SJ Wang, D Sauveron. 2012. Wiley Online Library Security and Communication …1 cites.
  774. Self-certified digital signatures“. N Li. 2011. ro.uow.edu.au 1 cites.
  775. Signatures for Multi-source Network Coding“. Y Mingxi, L Jiao, L Layuan. 2010. … NO 13 WEST CHANG AN AVENUE … China …1 cites.
  776. Survey on Privacy Preserving Public Auditing for Shared Data in Cloud“. P Kapadne. 2015. pnrsolution.org 1 cites.
  777. The Evolution of Self-Organized Privacy“. J Freudiger. 2008. EPFL 1 cites.
  778. Threshold discernible ring signatures“. S Kumar, S Agrawal, R Venkatesan, SV Lokam…. 2010. Springer ICETE1 cites.
  779. Threshold Ring Signatures Efficient for Large Sets of Signers.“. K Maneva-Jakimoska, G Jakimoski…. 2005. eprint.iacr.org IACR Cryptology ePrint …1 cites.
  780. Two-Party (Blind) Ring Signatures and Their Applications.“. MH Au, W Susilo. 2014. books.google.com ISPEC1 cites.
  781. リング署名における署名者の証明と匿名性破棄プロトコル“. 菊池浩明, 多田美奈子, 中西祥八郎. 2004. ipsj.ixsq.nii.ac.jp 情報処理学会論文誌1 cites.
  782. リング署名プロトコルにおける署名者開示“. 菊池浩明, 多田美奈子, 中西祥八郎. 2003. ipsj.ixsq.nii.ac.jp 情報処理学会研究報告 …1 cites.
  783. 基于有限惩罚建立无线自组网的激励机制倡“. 魏华, 孙浩, 周雪梅. 2009. arocmag.com 计算机应用研究1 cites.
  784. (Hierarchical Identity-Based) Threshold Ring Signatures.“. VK Wei, TH Yuen. 2006. IACR Cryptology ePrint Archive0 cites.
  785. … Certification after RegistrationUndeniable and Unpretendable SignaturesSub-Linear Size Traceable Ring Signatures without Random OraclesAn Efficient …“. J RYU. 0. search.ieice.org0 cites.
  786. … Certification after RegistrationUndeniable and Unpretendable SignaturesSub-Linear Size Traceable Ring Signatures without Random OraclesAn Efficient …“. J RYU. 0. search.ieice.org0 cites.
  787. … Ring-Signaturen für die Car2X-Kommunikation unter Verwendung von sicherem Speicher: Implementation of ring signatures for Car2X-Communication …“. J Wagener. 2014. . 0 cites.
  788. 2008 Index IEEE Transactions on Dependable and Secure Computing Vol. 5“. S Bagchi, E Bertino, B Blanchet, D Brumley…. 2008. Computer networks0 cites.
  789. A chronology of climatic downturns through the mid-and late-Holocene: tracing the distant effects of explosive eruptions from palaeoclimatic and historical …“. J Holopainen, M Macias-Fauria, M Timonen…. 2013. Co-Action Publishing 0 cites.
  790. A Forward Secure Ring Signature Scheme“. B Wansu, W Yun. 2008. ieeexplore.ieee.org Intelligent Information Hiding and Multimedia …0 cites.
  791. A LITERATURE SURVEY ON A NOVEL PRIVACY PRESERVING PUBLIC AUDITING MECHANISM ON SHARED CLOUD DATA USING ORUTA“. MA Priyanga, PDRV Kumar. 0. ijarece.org0 cites.
  792. A LITERATURE SURVEY ON SECURITY BASED FORWARD RING SIGNATURE SCHEME USING IDENTITY INFORMATION“. V Dhinakari, R NallaKumar, LS Santhoshkumar. 0. ijcrcst.com0 cites.
  793. A New Aggregate Signature Scheme in Cryptographic Currency“. C Yuan, M Xu, X Si. 0. ijpe-online.com International Journal of Performability Engineering0 cites.
  794. A New Approach to Threshold Attribute Based Signatures“. SSD Selvi, S Venugopalan, CP Rangan. 0. pdfs.semanticscholar.org0 cites.
  795. A new certificateless self-identifiable ring signature scheme“. Y Sang, L You. 2010. ieeexplore.ieee.org … Engineering and Informatics (BMEI), 2010 3rd …0 cites.
  796. A New Multivariate-based Ring Signature Scheme“. L ling Wang. 2013. atlantis-press.com 0 cites.
  797. A New Ring Signature Scheme with Multiple Functions“. J He, B Liu. 2012. dianzikeji.org Dianzi Keji- Electronic Science and Technology0 cites.
  798. A New SDV Anonymous Proxy Signature Scheme“. X Wang. 2010. ieeexplore.ieee.org Computational Aspects of Social Networks (CASoN) …0 cites.
  799. A Novel Approach for Auditing for Data in the Cloud by Using Privacy-Preserving Techniques“. B Ravikumar, P Venuthurumilli. 2015. International Journal of Research0 cites.
  800. A Novel Method for Blocking Misbehaving Users over Anonymizing Networks“. ANVK Gopichand, SG Gouse. 0. pdfs.semanticscholar.org0 cites.
  801. A Privacy Preserving Techniques to Improve Privacy and Efficiency of Smart Grid Technology“. AP Nazimunisa, VS Kamalam…. 2016. jncet.org Journal of Network …0 cites.
  802. A provable secure anonymous proxy signature scheme without random oracles.“. R Toluee, MR Asaar…. 2013. pdfs.semanticscholar.org IACR Cryptology ePrint …0 cites.
  803. A Ring Signature Scheme“. R signatures are introduced by Shamir. 0. . 0 cites.
  804. A Ring Signature Scheme Based on Bilinear Pairings“. CAI Qing-hua. 2006. en.cnki.com.cn Microcomputer Applications0 cites.
  805. A ring signature scheme with anonymous strong-designated verifiers“. 莊嘉富. 2015. tkuir.lib.tku.edu.tw 0 cites.
  806. A Secure Distributed Nymble for Blocking Misbehaving Users in Anonymizing Networks“. N Theja, T Jayakumari. 2012. ciitresearch.org Networking and Communication …0 cites.
  807. A Short Linkable Ring Signature Scheme for E-Cash Protocol“. L WANG, G ZHANG, C MA. 2008. en.cnki.com.cn Journal of Beijing University of Posts …0 cites.
  808. A Survey of Privacy Preserving Auditing Techniques for Shared Data in Cloud Computing“. R Kapadiya, J Prajapati. 2015. search.proquest.com International Journal of Computer …0 cites.
  809. A Threshold Ring Signature Scheme with a Variety of Keys“. MJ Hinek. 2004. pdfs.semanticscholar.org 0 cites.
  810. A Verifiable Ring Signature Scheme Based on Multivariate Public-Key Cryptosystem“. LL Wang. 2013. Trans Tech Publ Applied Mechanics and Materials0 cites.
  811. A Worthwhile Authentication and Unidentified Data Sharing with Advance Security“. KC LAKSHMI, CMD GULZAR. 2016. ijitech.org 0 cites.
  812. Advanced Traceability Mechanism for Shared Data in the Cloud“. KJ Rasal, SA Kahate. 0. ijettjournal.org0 cites.
  813. An anonymous ring signature scheme with strong specified verifiers“. 鄭凱隆. 2009. tkuir.lib.tku.edu.tw 0 cites.
  814. An Efficient (nt)-out-of-n Threshold Ring Signature Scheme“. T Isshiki, K Tanaka. 2003. researchgate.net 0 cites.
  815. An Efficient Blind Ring Signature Scheme“. J Zhang, X Liu. 2010. ieeexplore.ieee.org … ICIE), 2010 WASE International Conference on0 cites.
  816. An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model“. G Zhou, P Zeng, X Yuan, S Chen…. 2017. hindawi.com Security and …0 cites.
  817. An Efficient Identity-Based Concurrent Signature Scheme“. J Zhang, S Gao. 2010. ieeexplore.ieee.org Information Technology and Applications …0 cites.
  818. An Efficient Privacy Preserving Scheme over Encrypted Data in Cloud“. K Panmand, S Kadam. 0. pdfs.semanticscholar.org0 cites.
  819. An efficient ring signature scheme for privacy and anonymous communication“. L Wang, G Zhang, C Ma. 2007. ieeexplore.ieee.org … and E-Commerce, 2007. ISDPE 2007 …0 cites.
  820. An efficient ring signature scheme for privacy and anonymous communication“. L Wang, G Zhang, C Ma. 2007. ieeexplore.ieee.org … and E-Commerce, 2007. ISDPE 2007 …0 cites.
  821. An efficient strong designated-verifier ring signature scheme providing maximal signer’s anonymity“. 陳炯燁. 2010. tkuir.lib.tku.edu.tw 0 cites.
  822. An Improved and Trustworthy Communication Framework in Wireless Sensor Network’s“. PVKM Sreenivasulu. 0. ijiset.com0 cites.
  823. An Original Privacy Protective Mechanism That Supports Public Auditing On Shared Information Hold on Within the Cloud“. M PRAMEELA, DRTS LATHA. 2015. . 0 cites.
  824. An Public Auditing Mechanism for Shared Data in the Cloud“. S Rizwana, DW Tahseen. 2015. International Journal of Research0 cites.
  825. Analysis of Fair Concurrent Signature Exchange Protocol using ATL“. PE Phyu, KKK Kyaw. 2014. ijsetr.com 0 cites.
  826. Attribute-Based Signatures with DNF Policies“. KS Lee, JY Hwang, HJ Kim…. 2009. koreascience.or.kr Journal of the Institute of …0 cites.
  827. Audit with Privacy and Data Distribution in Cloud Computing“. P Anusha, IRP Reddy. 0. ijracse.com0 cites.
  828. Auditing Shared Data in Cloud through Privacy Preserving Mechanisms: A Survey“. VR Babu, S EnReddy. 2016. indianjournals.com … of Innovation in Computer Science and …0 cites.
  829. Auditing the Shared Data in Cloud through Privacy Preserving Mechanisms“. VR Sai, VL Naidu, A Srinivasulu. 2015. search.proquest.com i-manager’s Journal on …0 cites.
  830. AUTHENTICATION OF DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD“. PG KRISHNA, UMA MAHESWARI. 0. ijiemr.org0 cites.
  831. Big data privacy-preserved public auditing for shared data in cloud“. G Mangalassery, DL Manilal. 0. ijettcs.org0 cites.
  832. Big data privacy-preserved public auditing for shared data in cloud“. G Mangalassery, DL Manilal. 0. ijettcs.org0 cites.
  833. Code-based signature schemes with special properties“. PL Cayrel. 0. . 0 cites.
  834. Community Auditing Cloud Partitioning for the Public Cloud“. P SAISWAPNA, M CHIRANJEEVI. 2015. ijitech.org 0 cites.
  835. Confidentiality in Public Auditing for Shared Data in the Cloud“. GCR REDDY, DRGSV KUMAR. 2015. . 0 cites.
  836. CONFIRMATION OF DATA INTEGRITY CONCERNING SHARED DATA IN CLOUD PLATFORM“. L Jadi, B Uppalaiah. 0. ijares.com0 cites.
  837. Constructing Designated-Verifier Ring Signature and Ring Signcryption under the k-CCA2 Assumption“. F Xiao-tong, L Wen. 2012. ieeexplore.ieee.org Intelligent Networking and Collaborative …0 cites.
  838. Contributions on fair exchange of digital signatures“. Y Wang. 2014. ro.uow.edu.au 0 cites.
  839. Contributions to privacy preserving with ring signatures“. YQ Chen. 2006. ro.uow.edu.au 0 cites.
  840. Converting Cryptographic Schemes from Composite Order to Prime Order Pairing“. R Kabaleeshwaran, MPL Das, S Chatterjee. 0. ece.iisc.ernet.in0 cites.
  841. Cost-Effective Authentic & Anonymous Data Sharing with Forward Security“. R Nagar, DM Patil, DM Patil, CD Pagare. 0. ijream.org0 cites.
  842. Crypto-Book: Privacy Preserving Online Identities“. J Maheswaran, D Wolinsky, B Ford. 0. cs.yale.edu0 cites.
  843. Cryptographic protocols from declarative specifications“. M Backes, RM Reischuk. 2010. Proceedings of the Grande Region Security and …0 cites.
  844. CT-RSA 2006“. D Pointcheval. 0. Springer0 cites.
  845. Decentralized Access Control Scheme for Secure Data Storage in Clouds“. BK VENI, GV VANI. 2015. . 0 cites.
  846. Decentralized Privacy Preserving for Securing Data in Clouds“. P VidhyaLakshmi, C Premalatha, M RamyaRamPrasad. 0. ijreat.org0 cites.
  847. Deniable Ring Signatures“. E Reich. 2007. dspace.mit.edu 0 cites.
  848. Design of New Linearly Homomorphic Signatures on Lattice“. R Choi, K Kim. 2017. pdfs.semanticscholar.org 0 cites.
  849. Design the Efficiency Public Auditing Mechanism Using Identity Privacy and Traceability Concepts“. D Sharanya, KR Prasad, MM Bala. 0. ijarf.com0 cites.
  850. Designated verifier ring signature and ring signcryption“. X Fu, W Liu, R Shi. 2013. inderscienceonline.com International Journal of Intelligent …0 cites.
  851. Digital Signatures“. T Baigèneres, Y Lu, S Vaudenay, P Junod…. 2006. Springer A Classical Introduction …0 cites.
  852. Distributed System in Platform Security Using Mobile Agent“. B Sriprathha, S Muthukumaraswamy. 0. pdfs.semanticscholar.org0 cites.
  853. Dynamic privacy management for communications of clients in privacy-preserving groups“. ME Van Dijk, E Kolman, R Hodgman. 2017. Google Patents US Patent 9,660,8130 cites.
  854. Effective data sharing using advanced ring signature with forward security“. E Chandanapriya, G Murali. 2016. ieeexplore.ieee.org Communication and Electronics …0 cites.
  855. ENCRYPTION-BASED ACCESS CONTROL WITH EFFICIENT REVOCATION“. VJ Naik, M Eranna. 0. ijetcse.com0 cites.
  856. Enhanced Cloud Access Control Methodology for Preventing Leakage of Sensitive and Policy Information“. Q FATIMA, S JABEEN, S FARHA. 2015. . 0 cites.
  857. Enhancement of Generalized Ring Signatures with Convertibility“. SF Tzeng, SJ Horng. 2012. ieeexplore.ieee.org Biometrics and Security Technologies …0 cites.
  858. Erratum: Ring signatures for benzenoids with up to seven rings, Part 2: Pericondensed systems“. AT Balaban, M Randić. 2012. Wiley Online Library International Journal of Quantum …0 cites.
  859. Fair exchange signature schemes“. K KyungSup. 2010. cnki.com.cn Science0 cites.
  860. FORWARDED SECURE IDENTITY BASED RING SIGNATURE SCHEME WITH SEGMENTED CELLULAR AUTOMATA SCHEMES“. SN Saranya, P Thilagavathi, M Suguna. 0. ijcrcst.com0 cites.
  861. Generalized Anonymous Information Sharing“. J Ren, L Ham. 2007. ieeexplore.ieee.org … Processing Applications for Public Security and …0 cites.
  862. Group-oriented ring signature.“. C Ma, J Ao. 2011. eprint.iacr.org IACR Cryptology ePrint Archive0 cites.
  863. Hierarchical Ring Signatures Revisited–Unconditionally and Perfectly Anonymous Schnorr Version“. Ł Krzywiecki, M Sulkowska, F Zagórski. 2015. Springer International Conference on …0 cites.
  864. Homomorphic authenticable ring signature mechanism for Public Auditing on shared data in the Cloud“. MSGD Patwardhan, BW Balkhande. 0. ijecs.in0 cites.
  865. How to leak a secret from multiple sources“. J Reny, L Harnz, T Li. 2008. ieeexplore.ieee.org Military Communications Conference …0 cites.
  866. ID-Based Deniable Ring Signature With Constant-Size Signature And Its Extention“. C HU, P LIU. 2010. pdfs.semanticscholar.org Journal of Computational Information …0 cites.
  867. Identity Based Ring Signature“. SSMCRWC Lui, LCKHSM Yiu. 0. pdfs.semanticscholar.org0 cites.
  868. Identity Based Threshold Ring Signature from Lattices“. B Wei, Y Du, H Zhang, F Zhang, H Tian…. 2014. Springer … Conference on Network …0 cites.
  869. Identity-based ring signature scheme based on quadratic residuesfD“. X I’Iu, Q Zhiguang, L Fagen. 0. . 0 cites.
  870. Identity-Based Xtr Blind Signature Scheme“. Q Tang, F Shen. 2013. Taylor & Francis Intelligent Automation & Soft Computing0 cites.
  871. Identity-basedAuthentic and Anonymous Data Sharing with Forward Security“. S Mohan. 2016. ijircee.in Identity0 cites.
  872. IKS“. J Koch. 2015. . 0 cites.
  873. Implementación en Java de una librería para la creación de firma grupal apta para cloud collaboration“. J Arumí Pauls. 2016. upcommons.upc.edu 0 cites.
  874. Implementing Data Protection using Homomorphic Authenticators and Ring Signatures in Clouds“. R GUMMADI, KJSRI HARSHA. 2015. . 0 cites.
  875. IMPROVED GENERALIZED RING SIGNATURES“. HYU CHIEN. 2014. ci.nii.ac.jp ICIC express letters. Part B, Applications: an …0 cites.
  876. Maintaining Integrity for Shared Data In Cloud With Ring Signatures“. N Nagamani, SS Ali. 2015. ijseat.com IJSEAT0 cites.
  877. Maintaining unlinkability in group based P2P environments“. JAMJ Herrera-Joancomartı. 0. in3.uoc.edu0 cites.
  878. Mesospheric airglow and ionospheric responses to upward-propagating acoustic and gravity waves above tropospheric sources“. JB Snively, MD Zettergren. 2013. adsabs.harvard.edu AGU Fall Meeting Abstracts0 cites.
  879. Modification of One Forward Secure Ring Signature Scheme Based on Bilinear Groups of Composite Order“. Z Cao, X Wu, H Cao. 2013. ieeexplore.ieee.org Cloud and Service Computing (CSC) …0 cites.
  880. Multivariate Public Key Cryptography-Based Proxy Ring Signature Scheme“. CY Sun, YF Li, XM Si. 2012. Journal of Information Engineering … Journal of …0 cites.
  881. New Construction of Constant-Size Identity-based Linkable Ring Signature“. F Wang, Y Zheng. 2013. Advanced Institutes of Convergence … Journal of Convergence …0 cites.
  882. New Convertible Ring Signatures Based on RSA“. K Huang, R Tso. 0. nccur.lib.nccu.edu.tw0 cites.
  883. Nominative Proxy Ring Signature“. C Hu, P Liu, G Zhang. 2009. ieeexplore.ieee.org … Computing, 2009. SNPD’09. 10th ACIS …0 cites.
  884. On the definition of anonymity for ring signatures“. M Ohkubo, M Abe. 2006. Springer Lecture notes in computer science0 cites.
  885. ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES“. P Rangan. 0. pdfs.semanticscholar.org0 cites.
  886. Optical pattern recognition by diffraction pattern sampling“. HL Kasdan. 1979. proceedings.spiedigitallibrary.org Society of Photo-Optical …0 cites.
  887. Optimal Data Sharing with Forward Security“. DV Shinde, BM Patil. 2016. pdfs.semanticscholar.org International Journal of Computer …0 cites.
  888. Optimizing ring signature keys for e-voting“. JL Tornos, JL Salazar, JJ Piles. 2015. ieeexplore.ieee.org Wireless Communications and …0 cites.
  889. ORUTA: Enabling Security and Public Batch Auditing for Distributed Data in the Cloud“. PV PRIYA, A HARITHA. 2015. . 0 cites.
  890. ORUTA: Enabling Security and Public Batch Auditing for Distributed Data in the Cloud“. PV PRIYA, A HARITHA. 2015. . 0 cites.
  891. Oruta: Public Auditing for Shared Data in the Cloud Storage“. MMB Patil, MNA Kumar. 2014. irjcs.com 0 cites.
  892. Paleoflood records from anatomical tree-ring signatures“. S St George, E Nielsen. 2003. adsabs.harvard.edu AGU Fall Meeting Abstracts0 cites.
  893. Poster: Towards Blockchain Transaction Privacy“. M Di Ferrante, R Mercer. 0. clearmatics.com0 cites.
  894. PPAKBS: Privacy-Preserving Public Auditing for Key generation Based Cloud Storage using Batch Signature“. N Keerthika. 0. ijmcs.info0 cites.
  895. Price Negotiation Systems for M-commerce“. Z Huafei, B Feng…. 2007. ieeexplore.ieee.org … , 2007. ICC’07. IEEE …0 cites.
  896. Privacy Enhancing Technologies“. LD Nguyen. 2005. . 0 cites.
  897. Privacy on the Blockchain: Unique Ring Signatures“. R Mercer. 2016. arxiv.org arXiv preprint arXiv:1612.011880 cites.
  898. Privacy Preserved Data Auditing For Clouds“. RDA Sudha. 0. techscripts.org0 cites.
  899. Privacy Preserving and Effective User Revocation on Dynamic Groups using CP-ABE Scheme“. MS Kumari, K Santhi, BT Rao. 0. Citeseer0 cites.
  900. PRIVACY PRESERVING THROUGH RING SIGNATURE METHOD“. HR MANJUNATH. 2015. israse.com 0 cites.
  901. Privacy-Preserving Public Auditing for Shared Data in the Cloud“. CM Jadhav, MSD Shabade. 0. ijecs.in0 cites.
  902. Privacy-Preserving Public Auditing using Ring Signatures for Secure Cloud Storage“. S Bhagyashri, YB Gurav. 0. . 0 cites.
  903. Privacy-Retaining Public Analyzing for Shared Data in the Cloud“. MR Patil, S Dharavath. 2015. ijarcsms.com 0 cites.
  904. Projecte de tesi“. JH Sotoca. 0. . 0 cites.
  905. Protection of Shared Data using Auditing in Public Cloud“. N GOPI, R REVATHI, NS SUHASINI. 2016. ijatir.org 0 cites.
  906. Proving Computational Soundness of the Applied Pi-Calculus without Using Computable Parsing“. H Comon-Lundh, M Hagiya, Y Kawamoto, H Sakurada. 0. cs.bham.ac.uk0 cites.
  907. Public Key Cryptography–PKC 2007“. TOX Wang. 2007. Springer 0 cites.
  908. Public Key Infrastructure: Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30-July 1, 2005, Revised …“. D Chadwick, G Zhao. 2005. books.google.com 0 cites.
  909. Record Maintenance and Secure Preserving Of Shared Data in Public Auditing“. M Rafeeq. 2015. Research Trend International Journal on Emerging Technologies0 cites.
  910. Regulating the Deep Web Through Controlled BlockChains and Crypto-Currency Networks“. K Hegadekatti. 2016. papers.ssrn.com 0 cites.
  911. RELIABLE AND SECURE DATA SHARING WITH FORWARD SECURITY IN CLOUD ENVIRONMENTS“. K Sekhar, M Anand. 0. ijtre.com0 cites.
  912. Remote Data Auditing Scheme in Secured Cloud Storage Environment“. PG Scholar. 0. . 0 cites.
  913. Research on Electronic Cash Security Technology in Electronic Commerce“. SJ Gong, LD Jin. 2014. Trans Tech Publ Advanced Materials Research0 cites.
  914. Research on Strongly Unforgeable Ring Signature Scheme Based on ID“. G Zeng. 0. pdfs.semanticscholar.org0 cites.
  915. Review on Forward Secure Identity based Ring Signature for Data Sharing in the Cloud“. P Rumao, S Pundkar. 2016. search.proquest.com International Journal of Computer …0 cites.
  916. Revisiting optimistic fair exchange based on ring signatures“. Y Wang, MHA Au, W Susilo. 2014. ieeexplore.ieee.org IEEE Transactions on Information …0 cites.
  917. Revisiting Optimistic Fair Exchange Based on Ring Signatures……………… Y. Wang, MHA Au, and W. Susilo 1883 A Pragmatic Per-Device Licensing …“. L Zhang, CH Chang, X Ma, J Zhang, J Tao, J Li, J Tian…. 0. ieeexplore.ieee.org0 cites.
  918. RING CT FOR MONERO“. SN MRL. 0. pdfs.semanticscholar.org0 cites.
  919. Ring signature scheme from multilinear maps in the standard model“. X Zhang, Z Liu, X Wang. 2015. ieeexplore.ieee.org P2P, Parallel, Grid, Cloud and …0 cites.
  920. Ring Signatures for Benzenoids With up to Seven Rings, Part 2: Pericondensed Systems (vol 108, pg 898, 2008)“. AT Balaban, M Randic. 2011. … , 350 MAIN ST, MALDEN 02148, MA … …0 cites.
  921. Ring Signatures of Constant Size Without Random Oracles“. F Tang, H Li. 2014. Springer International Conference on Information Security and …0 cites.
  922. Ring Signatures of Constant Size Without Random Oracles“. F Tang, H Li. 2014. Springer International Conference on Information Security and …0 cites.
  923. Ring Signatures with a Designated Receiver“. JS Lee, JH Chang. 0. Korean Institute of Information … Proceedings of the Korean …0 cites.
  924. RingRainbow–An Efficient Multivariate Ring Signature Scheme“. MSE Mohamed, A Petzoldt. 2017. Springer International Conference on Cryptology in …0 cites.
  925. Salvation of Information Exchange Over Cloud Service Provider by Predicate Based Algorithm and Finest Access Control by Attribute Based Signature“. NRKAP Narensingh, S Yadav. 0. academia.edu0 cites.
  926. Scalable Anonymous Authentication“. A Bergal, B Tidor, E Hsu, C Zuo. 0. courses.csail.mit.edu0 cites.
  927. SCRAM BASED SECURITY FOR DATA SHARING IN DYNAMIC CLOUD ENVIRONMENT“. B Gunalan, T Christoper. 0. ijeete.com0 cites.
  928. Security Analysis Concerning the Random Numbers of Threshold Ring Signatures“. K Huang, R Tso. 2012. ieeexplore.ieee.org Information Technology: New Generations …0 cites.
  929. Security Challenges for Public Cloud“. R Raghavendran, L Parthasarathi, N Deepa. 2015. pdfs.semanticscholar.org 0 cites.
  930. Security Preserving Access Control Mechanism In Public Clouds Using PANDA Security Mechanism“. M Pingale, J Pingalkar. 0. spvryan.org0 cites.
  931. Some Thoughts on Strong Unforgeability in Ring Signature Schemes“. C Wang. 2012. Trans Tech Publ Advanced Materials Research0 cites.
  932. Special Issue on JITEL 2013 Best Papers“. JM Lopez-Soler. 2014. macrothink.org Network Protocols and Algorithms0 cites.
  933. Stealth Address, Ring Signatures, Monero“. NT Courtois. 0. nicolascourtois.com0 cites.
  934. Study of Secure Auditing Techniques with Efficient User revocation In Cloud“. MN Ravindran. 2017. imperialjournals.com Imperial Journal of Interdisciplinary Research0 cites.
  935. Superior Traceability Machine for Shared Data in the Cloud“. MRK Jayesh, SV Gumaste…. 2015. researchgate.net International Journal of …0 cites.
  936. Survey on Forward Security for Authentic and Anonymous Data Sharing with Auditing Integrity“. VA Gaikwad, SD Babar. 0. pdfs.semanticscholar.org0 cites.
  937. Switch Commitments: A Safety Switch for Confidential Transactions.“. T Ruffing, G Malavolta. 2017. eprint.iacr.org IACR Cryptology ePrint Archive0 cites.
  938. Teleport: anonymity through off-blockchain transaction information transfer A Dark Paper for BTCD“. CJ Lee. 0. . 0 cites.
  939. The extracts below are taken from the BCS’s eminent academic monthly, The Computer Journal, published with Oxford University Press.“. I Awan. 2013. academic.oup.com ITNow0 cites.
  940. Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006: Proceedings“. S Halevi. 2006. books.google.com 0 cites.
  941. This paper provides either security proofs or attacks for a large number of identity-based identification and signature schemes defined either explicitly or implicitly in …“. R Impagliazzo, R Jaiswal, V Kabanets. 2009. infona.pl Journal of Cryptology0 cites.
  942. Threshold Ring Signatures for Ad-hoc CroupsG“. E Bressonh, J Sternh, M Szydlo. 0. di.ens.fr0 cites.
  943. Threshold Ring Signatures in the Random Oracle Model“. 一色寿幸, 田中圭介, 東京工業大学数理…. 2004. kurims.kyoto-u.ac.jp 数理解析研究所 …0 cites.
  944. Threshold Ring Signatures in the Random Oracle Model (Evolutionary Advancement in Fundamental Theories of Computer Science)“. T Isshiki, K Tanaka. 2004. repository.kulib.kyoto-u.ac.jp 0 cites.
  945. Time and frequency domain measurements for plutonium metal rings“. JT Mihalczo, VK Pare, ED Blakeman, TE Valentine…. 1996. osti.gov 0 cites.
  946. Toward Unlinkable Bitcoin Transactions“. A Poelstra, G Maxwell. 0. download.wpsoftware.net0 cites.
  947. Traceability Mechanism for Sharing Data in Cloud“. KJ Rasal, SA Kahate. 2015. search.proquest.com International Journal of Science …0 cites.
  948. Track 1-Parallel Algorithms-Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register“. X Li, D Zheng, K Chen. 2007. Berlin: Springer-Verlag, 1973- Lecture Notes in Computer …0 cites.
  949. Tree-ring signatures and weather anomalies.(Oak stand Guttenberger Forest, weather station Wuerzburg).“. B Becker, R Glaser. 1991. agris.fao.org Forstwissenschaftliches Centralblatt0 cites.
  950. Two ID-Based Analogous Ring Signature Schemes“. ZJHW Ji-Lin, W Yu-Min. 2005. journal.ucas.ac.cn 中 国科学院 研究生院 学报0 cites.
  951. Unconditionally Anonymous Controllable ID-Based Ring Signatures“. PK Thandra, J Rajan…. 2015. Taylor & Francis Journal of Discrete …0 cites.
  952. Unconditionally Anonymous Ring and Mesh Signatures“. X Boyen. 2016. Springer Journal of Cryptology0 cites.
  953. Universal Forgery on Shen et al.’s Linkable and Convertible ID-based Ring Signature Scheme.“. SJ Hwang. 2014. tkuir.lib.tku.edu.tw ICS0 cites.
  954. Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures⋆“. X Bultel, P Lafourcade. 0. eprint.iacr.org0 cites.
  955. Usage of Ring Signatures To Develop Homomorphic Authenticators In Oruta To Confirm The Uprightness Of Shared Information“. B Sneha, GS Suneetha, KC Sekhar. 2015. ijrcct.org IJRCCT0 cites.
  956. Utilization Of Ring Signatures To Construct Homomorphic Authenticators In ORUTA To Verify The Integrity of Shared Data“. GMP Reddy, KC Pradeep. 2016. ijseat.com IJSEAT0 cites.
  957. What is the SSN proxy good for?“. HS Hudson, BT Welsch. 2013. adsabs.harvard.edu AGU Fall Meeting Abstracts0 cites.
  958. Кільцеві підписи та їх властивості“. ДВ Шевченко. 2007. irbis-nbuv.gov.ua Радіоелектронні і комп’ютерні системи0 cites.
  959. 지정된 수신자를 갖는 환 서명“. 이지선, 장직현. 2006. 한국정보과학회 학술발표논문집0 cites.
  960. 一种基于 q-SDH 假设的选择关联环签名方案 Selectively Linkable Ring Signature Scheme Based on the q-SDH Assumption“. 李伟, 唐明伟, 范明钰. 2012. scgx.cbpt.cnki.net 西华大学学报 (自然科学版)0 cites.
  961. 两种基于 ID 的类环签名方案“. 张键红, 王继林, 王育民. 2005. journal.ucas.ac.cn 中国科学院大学学报0 cites.
  962. 並存簽章——安全性概念, 分析, 與建構議題“. H Huang. 2008. ir.lib.ncu.edu.tw 0 cites.
  963. 並存簽章——安全性概念, 分析, 與建構議題; Concurrent Signatures: Security Notions, Analysis, and Construction Issues“. 黃煥中. 2008. ir.lib.ncu.edu.tw 0 cites.
  964. 保護行動代理人所收集資料之研究; The Research of Mobile Agent Collected Data Protection“. 陳和樞. 2004. ir.lib.ncu.edu.tw 0 cites.
  965. 具可調整性之環簽章“. 陳子鍾. 2009. airitilibrary.com 亞洲大學會計與資訊學系學位論文0 cites.
  966. 具強指定驗證者的匿名環簽章“. KL Cheng. 2009. airitilibrary.com 淡江大學資訊工程學系碩士班學位論文0 cites.
  967. 具最佳簽章者匿名性的有效指定驗證者之環簽章法“. JY Chen. 2010. airitilibrary.com 淡江大學資訊工程學系碩士班學位論文0 cites.
  968. 具有強指定驗證者匿名性的環簽章法“. CF Chuang. 2015. airitilibrary.com 淡江大學資訊工程學系碩士班學位論文0 cites.
  969. 可指定驗証者的異質群體導向簽章系統“. 茆育成. 2001. ir.nctu.edu.tw 0 cites.
  970. 标准模型下条件匿名的环签名方案“. 曾晟珂, 秦志光, 陆庆. 2012. . 0 cites.
  971. 環狀公開金鑰密碼系統“. 張智超. 2005. ir.lib.ncku.edu.tw 0 cites.
  972. 環簽章可識別性之研究“. 劉又銓. 2005. airitilibrary.com 成功大學資訊工程學系學位論文0 cites.
  973. 适用于电子现金协议的简短关联环签名方案“. 王玲玲, 张国印, 马春光. 2008. 118.145.16.222 北京邮电大学学报0 cites.
  974. 适用于电子现金协议的简短关联环签名方案 A Short Linkable Ring Signature Scheme for E-Cash Protocol“. 王玲玲, 张国印, 马春光. 2008. 北京邮电大学学报0 cites.

———————————————————-

(Featured Image: ‘Sauron, the Lord of the Rings‘ by Callthistragedy1)