nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A class of rotation symmetric Boolean functions with optimum algebraic immunity
|
Li, Chunlei |
|
2008 |
13 |
6 |
p. 702-706 |
artikel |
2 |
A deniable authenticated key agreement protocol
|
Tian, Haibo |
|
2008 |
13 |
6 |
p. 645-650 |
artikel |
3 |
A general pairwise key predistribution scheme for wireless sensor networks
|
Ding, Xiaoyu |
|
2008 |
13 |
6 |
p. 744-748 |
artikel |
4 |
A geometric robust watermarking algorithm based on DWT-DCT and Zernike moments
|
Chen, Yu |
|
2008 |
13 |
6 |
p. 753-758 |
artikel |
5 |
A group-oriented (t,n) threshold signature scheme with traceable signers
|
Tan, Zuowen |
|
2008 |
13 |
6 |
p. 680-684 |
artikel |
6 |
Analysis of the design methods of word oriented linear feedback shift registers
|
Zeng, Guang |
|
2008 |
13 |
6 |
p. 712-716 |
artikel |
7 |
An analysis of international data encryption algorithm(IDEA) security against differential cryptanalysis
|
Chen, Jia |
|
2008 |
13 |
6 |
p. 697-701 |
artikel |
8 |
An efficient identity-based anonymous signcryption scheme
|
Yu, Yong |
|
2008 |
13 |
6 |
p. 670-674 |
artikel |
9 |
A new certificateless public key encryption scheme
|
Chen, Yan |
|
2008 |
13 |
6 |
p. 721-726 |
artikel |
10 |
A new efficient blind signcryption
|
Yu, Xiuying |
|
2008 |
13 |
6 |
p. 662-664 |
artikel |
11 |
A new secure password authentication scheme using smart cards
|
Wang, Bangju |
|
2008 |
13 |
6 |
p. 739-743 |
artikel |
12 |
An improved sanitizable signature scheme
|
Wang, Shangping |
|
2008 |
13 |
6 |
p. 675-679 |
artikel |
13 |
A practical identity-based signature scheme
|
Li, Chenghua |
|
2008 |
13 |
6 |
p. 692-696 |
artikel |
14 |
Authenticated Diffie-Hellman key agreement protocol with forward secrecy
|
Zhang, Chuanrong |
|
2008 |
13 |
6 |
p. 641-644 |
artikel |
15 |
Cycling attacks against homomorphic cryptosystems
|
Wang, Lin |
|
2008 |
13 |
6 |
p. 727-732 |
artikel |
16 |
Efficient hierarchical identity based signature scheme in the standard model
|
Ren, Yanli |
|
2008 |
13 |
6 |
p. 665-669 |
artikel |
17 |
Efficient privacy enhanced software registration with ID-based blind signatures
|
Chen, Wuping |
|
2008 |
13 |
6 |
p. 733-738 |
artikel |
18 |
Efficient scalar multiplication for elliptic curves over binary fields
|
Gu, Haihua |
|
2008 |
13 |
6 |
p. 717-720 |
artikel |
19 |
Instantiate random oracles in OAEP with pseudorandom functions
|
Jia, Xiaoying |
|
2008 |
13 |
6 |
p. 651-656 |
artikel |
20 |
On the largest linear span of binary sequences with period p2 from interleaved construction
|
Li, Shenghua |
|
2008 |
13 |
6 |
p. 707-711 |
artikel |
21 |
Research on transferable off-line electronic cash system
|
Liu, Yichun |
|
2008 |
13 |
6 |
p. 749-752 |
artikel |
22 |
Secure proxy re-encryption from CBE to IBE
|
Chen, Yan |
|
2008 |
13 |
6 |
p. 657-661 |
artikel |
23 |
The multireceiver commitment schemes
|
Wang, Shuhong |
|
2008 |
13 |
6 |
p. 759-764 |
artikel |
24 |
Trust calculation and delivery control in trust-based access control
|
Lei, Jianyun |
|
2008 |
13 |
6 |
p. 765-768 |
artikel |
25 |
Universal designated multi verifier signature scheme without random oracles
|
Ming, Yang |
|
2008 |
13 |
6 |
p. 685-691 |
artikel |