Search for persons
X
?
Proceedings of the 2nd ACM symposium on Information, computer and communications security ,
2
Invisible designated confirmer signatures without random or..:
, In:
?
Proceedings of the 2006 ACM Symposium on Information, computer and communications security ,
3
Ring signatures without random oracles:
, In:
?
Proceedings of the sixth annual ACM-SIAM symposium on Discrete algorithms ,
7