Showing results 1 to 7 of 7
Aggregate proxy signature and verifiably encrypted proxy signature Li, J.; Kim, Kwangjo; Zhang, F.; Chen, X., 1st International Conference on Provable Security 2007, ProvSec 2007, pp.208 - 217, Springer Verlag (Germany), 2007-11-01 |
Generic security-amplifying methods of ordinary digital signatures Li, J.; Kim, Kwangjo; Zhang, F.; Wong, D.S., 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, pp.224 - 241, Springer Verlag (Germany), 2008-06-03 |
Identity-based chameleon hash scheme without key exposure Chen, X.; Zhang, F.; Susilo, W.; Tian, H.; Li, J.; Kim, Kwangjo, 15th Australasian Conference on Information Security and Privacy, ACISP 2010, pp.200 - 215, ACISP 2010, 2010-07-05 |
Identity-based secret signature scheme LEE, B.; Li, J.; Kim, Kwangjo, 4th International Conference on Computer Sciences and Convergence Information Technology, ICCIT 2009, pp.1080 - 1085, 2009-11-24 |
Practical threshold signatures without random oracles Li, J.; Yuen, T.H.; Kim, Kwangjo, 1st International Conference on Provable Security 2007, ProvSec 2007, v.4784, pp.198 - 207, 2007 |
Reversible data hiding giving priority to the use of edges and textures Hu, Y.; Lee, Heung-Kyu; Li, J., 5th International Conference on Visual Information Engineering, VIE 2008, no.543 CP, pp.643 - 647, IEEE, 2008-07-29 |
Reversible data hiding using prediction error values embedding Hu, Y.; Lee, Heung-Kyu; Li, J.; Chen, K., 6th International Workshop on Digital Watermarking, IWDW 2007, pp.244 - 253, Springer Verlag, 2007-12-03 |
Discover