Ring signature

Results: 54



#Item
11Towards Automatic Generation of Vulnerability-Based Signatures David Brumley, James Newsome, and Dawn Song Carnegie Mellon University Pittsburgh, PA, USA {dbrumley,jnewsome,dawnsong}@cmu.edu

Towards Automatic Generation of Vulnerability-Based Signatures David Brumley, James Newsome, and Dawn Song Carnegie Mellon University Pittsburgh, PA, USA {dbrumley,jnewsome,dawnsong}@cmu.edu

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
12arXiv:math.ACv2 25 NovTHE F -SIGNATURE AND STRONG F -REGULARITY IAN M. ABERBACH AND GRAHAM J. LEUSCHKE Abstract. We show that the F -signature of a local ring of characteristic p, defined by Huneke and Le

arXiv:math.ACv2 25 NovTHE F -SIGNATURE AND STRONG F -REGULARITY IAN M. ABERBACH AND GRAHAM J. LEUSCHKE Abstract. We show that the F -signature of a local ring of characteristic p, defined by Huneke and Le

Add to Reading List

Source URL: www.leuschke.org

Language: English - Date: 2012-03-03 17:51:49
    13Anonymous and Publicly Linkable Reputation Systems (Short Paper) Johannes Bl¨ omer? , Jakob Juhnke?? , and Christina Kolb? University of Paderborn,Department of Computer Science,Germany {bloemer,jakob.juhnke,christina.k

    Anonymous and Publicly Linkable Reputation Systems (Short Paper) Johannes Bl¨ omer? , Jakob Juhnke?? , and Christina Kolb? University of Paderborn,Department of Computer Science,Germany {bloemer,jakob.juhnke,christina.k

    Add to Reading List

    Source URL: fc15.ifca.ai

    Language: English - Date: 2015-01-11 00:33:38
    14Improved Lattice-Based Threshold Ring Signature Scheme Slim Bettaieb 1 1  Julien Schrek1

    Improved Lattice-Based Threshold Ring Signature Scheme Slim Bettaieb 1 1 Julien Schrek1

    Add to Reading List

    Source URL: pqcrypto2013.xlim.fr

    Language: English - Date: 2013-06-24 09:56:00
      15Preliminaries  q-SD identification scheme Improved threshold ring signature scheme

      Preliminaries q-SD identification scheme Improved threshold ring signature scheme

      Add to Reading List

      Source URL: www5.rz.rub.de

      Language: English - Date: 2012-07-23 07:47:09
        16CryptoNote v 2.0 Nicolas van Saberhagen October 17, 2013 1

        CryptoNote v 2.0 Nicolas van Saberhagen October 17, 2013 1

        Add to Reading List

        Source URL: cryptonote.org

        Language: English
        17ShadowCash: Zero­knowledge Anonymous Distributed E­Cash   via Traceable Ring Signatures    Rynomster and Tecnovert  http://www.shadow.cash   

        ShadowCash: Zero­knowledge Anonymous Distributed E­Cash   via Traceable Ring Signatures    Rynomster and Tecnovert  http://www.shadow.cash   

        Add to Reading List

        Source URL: shadow.cash

        Language: English - Date: 2014-12-15 21:08:51
        18Non-interactive Designated Verifier Proofs and Undeniable Signatures Caroline Kudla? and Kenneth G. Paterson Information Security Group Royal Holloway, University of London, UK {c.j.kudla,kenny.paterson}@rhul.ac.uk

        Non-interactive Designated Verifier Proofs and Undeniable Signatures Caroline Kudla? and Kenneth G. Paterson Information Security Group Royal Holloway, University of London, UK {c.j.kudla,kenny.paterson}@rhul.ac.uk

        Add to Reading List

        Source URL: www.isg.rhul.ac.uk

        Language: English - Date: 2005-09-06 11:06:02
        19Proxy Re-Signatures: New Definitions, Algorithms, and Applications∗ Giuseppe Ateniese† Susan Hohenberger‡

        Proxy Re-Signatures: New Definitions, Algorithms, and Applications∗ Giuseppe Ateniese† Susan Hohenberger‡

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2005-11-28 13:13:41
        20Microsoft Word - DA standarden.doc

        Microsoft Word - DA standarden.doc

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2011-12-20 21:30:21