Author: Konstantinou Elisavet Stamatiou Yannis Zaroliagis Christos
Publisher: Springer Publishing Company
ISSN: 1615-5262
Source: International Journal of Information Security (IJIS), Vol.6, Iss.1, 2007-01, pp. : 47-63
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Related content
Potential Good Reduction of Elliptic Curves
By Kida M.
Journal of Symbolic Computation, Vol. 34, Iss. 3, 2002-09 ,pp. :
By Bader M. Schraufstetter S. Vigh C.A. Behrens J.
International Journal of Computational Science and Engineering, Vol. 4, Iss. 1, 2008-11 ,pp. :
Secure and efficient data‐sharing in clouds
CONCURRENCY AND COMPUTATION: PRACTICE & EXPERIENCE (ELECTRONIC), Vol. 27, Iss. 8, 2015-06 ,pp. :
Generalization of proxy signature based on elliptic curves
By Hwang M.-S. Tzeng S.-F. Tsai C.-S.
Computer Standards and Interfaces, Vol. 26, Iss. 2, 2004-03 ,pp. :