Search for persons
X
?
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security ,
3
Reconstructing Chameleon Hash: Full Security and the Multi-..:
, In:
?
Information Security Practice and Experience; Lecture Notes in Computer Science ,
5
BAHS: A Blockchain-Aided Hash-Based Signature Scheme:
, In:
?
Cryptology and Network Security; Lecture Notes in Computer Science ,
7