Group signature

Results: 378



#Item
331Digital signature / Threshold cryptosystem / Verifiable secret sharing / Public-key cryptography / Secret sharing / RSA / BLS / Full Domain Hash / Blind signature / Cryptography / Group signature / Homomorphic encryption

To appear in 33rd Annual ACM Symposium on Principles of Distributed Computing (PODC 2014), Paris, France, July 11–15, [removed]Born and Raised Distributively: Fully Distributed Non-Interactive Adaptively-Secure Threshold

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2014-05-09 19:28:02
332Key management / Proactive secret sharing / Secret sharing / RSA / Threshold cryptosystem / Verifiable secret sharing / Group signature / Digital signature / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Cryptographic protocols

An Attack on the Proactive RSA Signature Scheme in the URSA Ad Hoc Network Access Control Protocol Stanisław Jarecki, Nitesh Saxena, and Jeong Hyun Yi School of Information and Computer Science UC Irvine, CA 92697, USA

Add to Reading List

Source URL: www.ics.uci.edu

Language: English - Date: 2004-09-30 20:04:09
333ID-based encryption / Security / Civil law / Digital signature / RSA / Group signature / Cryptography / Public-key cryptography / Cyberwarfare

PDF Document

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2014-05-09 20:15:57
334Elections / Postal voting / Ballot

POSTAL BALLOT PAPER NISA SUB-GROUP MEMBERS Ballot papers will not be accepted if the correct membership number is not provided and an original signature of the member included on the ballot form. To vote please place a

Add to Reading List

Source URL: www.iceskating.org.uk

Language: English - Date: 2014-05-13 08:55:33
335European Patent Organisation / Patentable subject matter / Canadian patent law / Software patent / Gottschalk v. Benson / Business method patent / Bilski v. Kappos / State Street Bank v. Signature Financial Group / G 3/08 / Law / Patent law / Business law

SCP/15/3 ANNEX II 2. Computer Programs As Excluded Patentable Subject Matter by Brad Sherman

Add to Reading List

Source URL: www.wipo.int

Language: English - Date: 2010-09-02 09:30:26
336Civil law / United States patent law / Patentable subject matter / State Street Bank v. Signature Financial Group / In re Bilski / Bilski v. Kappos / Machine-or-transformation test / Diamond v. Diehr / Business method patent / Law / Case law / Patent law

[removed]Bilski v. Kappos[removed])

Add to Reading List

Source URL: www.bettinger.de

Language: English - Date: 2010-07-10 18:09:30
337Case law / State Street Bank v. Signature Financial Group / United States patent law / Law / Mallinckrodt /  Inc. v. Medipart /  Inc.

Microsoft Word - 14377662_1.doc

Add to Reading List

Source URL: www.aipla.org

Language: English - Date: 2012-11-27 11:22:06
338Advanced Encryption Standard / Standards / Federal Information Processing Standard / Outline of cryptography / NSA Suite B Cryptography / Digital Signature Algorithm / Key size / Federal Information Security Management Act / Data Encryption Standard / Cryptography / Cryptography standards / National Institute of Standards and Technology

NISTIR[removed]NIST Cryptographic Standards and Guidelines Development Process (Draft) The Cryptographic Technology Group

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-02-18 11:32:45
339Key management / Group signature / Digital signature / Ring signature / Public key certificate / RSA / Signature / Digital credential / Blind signature / Cryptography / Public-key cryptography / Electronic commerce

Leak-free Mediated Group Signatures∗ Xuhua Ding School of Information Systems Singapore Management University [removed] Gene Tsudik

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2008-09-07 01:50:43
340Public key certificate / Digital signature / Online Certificate Status Protocol / Revocation list / Group signature / Certificate authority / SAS / Hash tree / Public key infrastructure / Cryptography / Public-key cryptography / Key management

Equipping “Smart” Devices With Public Key Signatures Xuhua Ding [removed] Daniele Mazzocchi [removed]

Add to Reading List

Source URL: www.mysmu.edu

Language: English - Date: 2006-02-19 04:01:22
UPDATE