Blind signature

Results: 86



#Item
21Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols Orhan Cetinkaya Institute of Applied Mathematics, METU, Ankara, Turkey  Abstract

Pseudo-Voter Identity (PVID) Scheme for e-Voting Protocols Orhan Cetinkaya Institute of Applied Mathematics, METU, Ankara, Turkey Abstract

Add to Reading List

Source URL: www.ceng.metu.edu.tr

Language: English - Date: 2007-03-01 07:18:29
22International Journal of Security and Its Applications Vol. 7, No. 1, January, 2013 A Secure and Anonymous Electronic Voting Scheme Based on Key Exchange Protocol§ Chun-Ta Li1 and Min-Shiang Hwang2,*

International Journal of Security and Its Applications Vol. 7, No. 1, January, 2013 A Secure and Anonymous Electronic Voting Scheme Based on Key Exchange Protocol§ Chun-Ta Li1 and Min-Shiang Hwang2,*

Add to Reading List

Source URL: www.sersc.org

Language: English - Date: 2013-01-31 11:04:41
23Universally Composable Adaptive Oblivious Transfer Matthew Green Susan Hohenberger  Johns Hopkins University

Universally Composable Adaptive Oblivious Transfer Matthew Green Susan Hohenberger Johns Hopkins University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-14 17:22:59
24Towards makinganonymous Matthew Green Johns Hopkins University Joint work with - Ian Miers, Christina Garman, Avi Rubin (Oakland ’13) - Alessandro Chiesa, Madars Virza, Ian Miers, Christina Garman,

Towards makinganonymous Matthew Green Johns Hopkins University Joint work with - Ian Miers, Christina Garman, Avi Rubin (Oakland ’13) - Alessandro Chiesa, Madars Virza, Ian Miers, Christina Garman,

Add to Reading List

Source URL: spar.isi.jhu.edu

Language: English - Date: 2014-01-29 08:07:39
25Privacy and Verifiability in Voting Systems: Methods, Developments and Trends Hugo Jonkera,∗ , Sjouke Mauwa,b , Jun Panga a University  of Luxembourg, Faculty of Sciences, Technology and Communication

Privacy and Verifiability in Voting Systems: Methods, Developments and Trends Hugo Jonkera,∗ , Sjouke Mauwa,b , Jun Panga a University of Luxembourg, Faculty of Sciences, Technology and Communication

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-25 07:33:00
26Protocol Interactions and the Chosen Protocol Attack John Kelsey Bruce Schneier Counterpane Systems 101 E. Minnehaha Parkway

Protocol Interactions and the Chosen Protocol Attack John Kelsey Bruce Schneier Counterpane Systems 101 E. Minnehaha Parkway

Add to Reading List

Source URL: www.schneier.com

Language: English - Date: 2014-03-02 23:18:30
27A Blind Signature Scheme over Braid Groups

A Blind Signature Scheme over Braid Groups

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2009-12-11 07:11:22
28Fair Multiple-bank E-cash in the Standard Model∗ Jiangxiao Zhang1 , Yanwu Gao1 , Chunhui Feng1 , Hua Guo2 , Zhoujun Li2 1 2  Mathematics and Information Technology Institute, Xingtai University, Xingtai, Hebei,

Fair Multiple-bank E-cash in the Standard Model∗ Jiangxiao Zhang1 , Yanwu Gao1 , Chunhui Feng1 , Hua Guo2 , Zhoujun Li2 1 2 Mathematics and Information Technology Institute, Xingtai University, Xingtai, Hebei,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-18 07:48:26
29Concurrent Blind Signatures without Random Oracles∗ Aggelos Kiayias† Hong-Sheng Zhou† Abstract

Concurrent Blind Signatures without Random Oracles∗ Aggelos Kiayias† Hong-Sheng Zhou† Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-05-20 02:15:48
30Tracing-by-Linking Group Signatures Victor K. Wei Dept. of Information Engineering, Chinese University of Hong Kong, Hong Kong  September 18, 2005

Tracing-by-Linking Group Signatures Victor K. Wei Dept. of Information Engineering, Chinese University of Hong Kong, Hong Kong September 18, 2005

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2005-09-17 23:49:43