Funkspiel schemes: an alternative to conventional tamper resistance
Proceedings of the 7th ACM conference on Computer and communications security
New approaches for deniable authentication
Proceedings of the 12th ACM conference on Computer and communications security
A novel deniable authentication protocol using generalized ElGamal signature scheme
Information Sciences: an International Journal
An electronic voting protocol with deniable authentication for mobile ad hoc networks
Computer Communications
A New ID-Based Deniable Authentication Protocol
Informatica
A non-interactive deniable authentication scheme based on designated verifier proofs
Information Sciences: an International Journal
Non-interactive deniable authentication protocol based on factoring
Computer Standards & Interfaces
An enhanced ID-based deniable authentication protocol on pairings
ICCSA'07 Proceedings of the 2007 international conference on Computational science and Its applications - Volume Part II
Full and partial deniability for authentication schemes
Frontiers of Computer Science in China
An efficient non-interactive deniable authentication scheme based on trapdoor commitment schemes
Computer Communications
A novel deniable authentication protocol based on Diffie-Hellman algorithm using pairing technique
Proceedings of the 2011 International Conference on Communication, Computing & Security
A new scheme for deniable/repudiable authentication
CASC'07 Proceedings of the 10th international conference on Computer Algebra in Scientific Computing
Cryptanalysis and Improvement of Robust Deniable Authentication Protocol
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |