The SCEAS System
Navigation Menu

Journals in DBLP

Computer Communications
1999, volume: 22, number: 8

  1. Stefanos Gritzalis, Diomidis Spinellis, Panagiotis Georgiadis
    Security protocols over open networks and distributed systems: formal methods for their analysis, design, and verification. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:697-709 [Journal]
  2. Jianying Zhou, Kwok-Yan Lam
    Securing digital signatures for non-repudiation. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:710-716 [Journal]
  3. Hung-Min Sun
    An efficient nonrepudiable threshold proxy signature scheme with known signers. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:717-722 [Journal]
  4. Wei-Hua He, Tzong-Chen Wu
    Cryptanalysis of Lee and Chang's ID-based information security functions. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:723-726 [Journal]
  5. Jiun-Jang Tsai, Tzonelih Hwang, Chih-Hung Wang
    New generalized group-oriented cryptosystem based on Diffie-Hellman scheme. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:727-729 [Journal]
  6. Narn-Yih Lee, Tzonelih Hwang
    Group-oriented undeniable signature schemes with a trusted center. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:730-734 [Journal]
  7. Kaijun Tan, HongWen Zhu
    A conference key distribution scheme based on the theory of quadratic residues. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:735-738 [Journal]
  8. B. Zhan, Z. Li, Y. Yang, Z. Hu
    On the security of HY-key authentication scheme. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:739-741 [Journal]
  9. Min-Shiang Hwang
    Cryptanalysis of a remote login authentication scheme. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:742-744 [Journal]
  10. Hung-Min Sun
    On-line multiple secret sharing based on a one-way function. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:745-748 [Journal]
  11. Yuh-Min Tseng, Jinn-ke Jan
    Anonymous conference key distribution systems based on the discrete logarithm problem. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:749-754 [Journal]
  12. Kaijun Tan, HongWen Zhu
    General secret sharing scheme. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:755-757 [Journal]
  13. Valdemar C. da Rocha Jr., D. L. de Macêdo
    A secret-key cipher based on a non-linear structured code. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:758-761 [Journal]
  14. Kaijun Tan, HongWen Zhu, S.-J. Gu
    Cheater identification in (t, n) threshold scheme. [Citation Graph (0, 0)][DBLP]
    Computer Communications, 1999, v:22, n:8, pp:762-765 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002