Showing 101 - 120 results of 378 for search '"Cryptography"', query time: 0.04s Refine Results
  1. 101
  2. 102

    ID-based threshold decryption with non-reconstruction of the private key by QIN Bao-shan 1, ZHOU Yuan2

    Published 2009-01-01
    Subjects: “…ID-based cryptography…”
    Get full text
    Article
  3. 103
  4. 104
  5. 105
  6. 106

    Review of algebraic attacks on stream ciphers by ZHANG Long1, WU Wen-ling2, WEN Qiao-yan1

    Published 2006-01-01
    Subjects: “…cryptography…”
    Get full text
    Article
  7. 107
  8. 108
  9. 109
  10. 110

    ID-based wireless authentication scheme with anonymity by ZHU Hui, LI Hui, SHU Wan-li, WANG Yu-min

    Published 2009-01-01
    Subjects: “…cryptography…”
    Get full text
    Article
  11. 111
  12. 112
  13. 113
  14. 114
  15. 115
  16. 116
  17. 117
  18. 118

    Provably secure certificate less blind proxy re-signatures by Tao FENG, Yi-xin LIANG

    Published 2012-09-01
    Subjects: “…certificateless cryptography…”
    Get full text
    Article
  19. 119
  20. 120