Search results
Multimedia Tools and Applications > 2018 > 77 > 14 > 18327- 18354
IEEE Transactions on Services Computing > 2017 > 10 > 5 > 826 - 838
Journal of Computer and System Sciences > 2017 > 86 > C > 49-58
Computers & Security > 2017 > 65 > C > 202-212
Future Generation Computer Systems > 2017 > 67 > C > 133-151
IEEE Access > 2017 > 5 > 12380 - 12388
Lecture Notes in Computer Science > Information Security and Cryptology — ICISC 2002 > Digital Signatures > 16-34
Lecture Notes in Computer Science > Progress in Cryptology — INDOCRYPT 2001 > Applications -I > 162-174
Lecture Notes in Computer Science > Financial Cryptography and Data Security > Reputation and Mix-Nets > 111-125
Lecture Notes in Computer Science > Information Security and Cryptology - ICISC 2003 > Digital Signatures II > 352-369
Lecture Notes in Computer Science > Information and Communications Security > Security Protocols > 419-434
Lecture Notes in Computer Science > Algorithms and Architectures for Parallel Processing > Information Security Internet > 214-225
Lecture Notes in Computer Science > Wireless Algorithms, Systems, and Applications > Data Management and Network Control in Wireless Networks > 261-265
Communications in Computer and Information Science > Applied Computing, Computer Science, and Advanced Communication > 193-200
International Journal of Information Security > 2016 > 15 > 1 > 81-109