Most Cited Ring Signature Publications

Ring SignatureLast updated November 4th, 2017.

  1. Aggregate and verifiably encrypted signatures from bilinear maps“. D Boneh, C Gentry, B Lynn, H Shacham. 2003. Springer Eurocrypt. 1592 cites.
  2. How to leak a secret“. R Rivest, A Shamir, Y Tauman. 2001. Springer Advances in Cryptology—ASIACRYPT …. 1355 cites.
  3. Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme“. A Boldyreva. 2003. Springer International Workshop on Public Key Cryptography. 741 cites.
  4. Efficient non-interactive proof systems for bilinear groups“. J Groth, A Sahai. 2008. Springer Advances in Cryptology–EUROCRYPT 2008. 637 cites.
  5. Diffraction-pattern sampling for automatic pattern recognition“. GG Lendaris, GL Stanley. 1970. ieeexplore.ieee.org Proceedings of the IEEE. 332 cites.
  6. 1-out-of-n signatures from a variety of keys“. M Abe, M Ohkubo, K Suzuki. 2002. Springer Advances in Cryptology—Asiacrypt 2002. 328 cites.
  7. Multi-signatures in the plain public-key model and a general forking lemma“. M Bellare, G Neven. 2006. dl.acm.org Proceedings of the 13th ACM conference on …. 310 cites.
  8. Accumulators from Bilinear Pairings and Applications.“. L Nguyen. 2005. Springer CT-RSA. 309 cites.
  9. Threshold ring signatures and applications to ad-hoc groups“. E Bresson, J Stern, M Szydlo. 2002. Springer Annual International Cryptology Conference. 304 cites.
  10. Sequential Aggregate Signatures and Multisignatures Without Random Oracles.“. S Lu, R Ostrovsky, A Sahai, H Shacham, B Waters. 2006. Springer Eurocrypt. 288 cites.
  11. Attribute-based signatures.“. HK Maji, M Prabhakaran, M Rosulek. 2011. Springer CT-RSA. 286 cites.
  12. An efficient strong designated verifier signature scheme“. S Saeednia, S Kremer, O Markowitch. 2003. Springer International conference on …. 269 cites.
  13. Security models and requirements for healthcare application clouds“. R Zhang, L Liu. 2010. ieeexplore.ieee.org Cloud Computing (CLOUD), 2010 IEEE 3rd …. 261 cites.
  14. Universal designated-verifier signatures“. R Steinfeld, L Bull, H Wang, J Pieprzyk. 2003. Springer Asiacrypt. 233 cites.
  15. Off-the-record communication, or, why not to use PGP“. N Borisov, I Goldberg, E Brewer. 2004. dl.acm.org … of the 2004 ACM workshop on Privacy …. 229 cites.
  16. Oruta: Privacy-preserving public auditing for shared data in the cloud“. B Wang, B Li, H Li. 2012. ieeexplore.ieee.org Cloud Computing (CLOUD), 2012 IEEE 5th …. 229 cites.
  17. Linkable spontaneous anonymous group signature for ad hoc groups“. JK Liu, VK Wei, DS Wong. 2004. Springer ACISP. 212 cites.
  18. Generalized identity based and broadcast encryption schemes“. D Boneh, M Hamburg. 2008. Springer Advances in Cryptology-ASIACRYPT 2008. 208 cites.
  19. Anonymous identification in ad hoc groups“. Y Dodis, A Kiayias, A Nicolosi, V Shoup. 2004. Springer Eurocrypt. 207 cites.
  20. Pairing-Based Cryptographic Protocols: A Survey.“. R Dutta, R Barua, P Sarkar. 2004. researchgate.net IACR Cryptology ePrint Archive. 207 cites.
  21. Practical Short Signature Batch Verification.“. AL Ferrara, M Green, S Hohenberger, MØ Pedersen. 2009. Springer CT-RSA. 206 cites.
  22. Ring signatures: Stronger definitions, and constructions without random oracles“. A Bender, J Katz, R Morselli. 2006. Springer TCC. 205 cites.
  23. Attribute-based signature and its applications“. J Li, MH Au, W Susilo, D Xie, K Ren. 2010. dl.acm.org … of the 5th ACM Symposium on …. 204 cites.
  24. Concurrent signatures“. L Chen, C Kudla, KG Paterson. 2004. Springer … on the Theory and Applications of …. 187 cites.
  25. Threshold attribute-based signatures and their application to anonymous credential systems.“. SF Shahandashti, R Safavi-Naini. 2009. Springer Africacrypt. 180 cites.
  26. Privacy preserving access control with authentication for securing data in clouds“. S Ruj, M Stojmenovic, A Nayak. 2012. ieeexplore.ieee.org Cluster, Cloud and Grid …. 179 cites.
  27. Knox: privacy-preserving auditing for shared data with large groups in the cloud“. B Wang, B Li, H Li. 2012. Springer Applied cryptography and network security. 175 cites.
  28. Attribute-Based Signatures: Achieving Attribute-Privacy and Collusion-Resistance.“. HK Maji, M Prabhakaran, M Rosulek. 2008. eprint.iacr.org IACR Cryptology ePrint Archive. 170 cites.
  29. Efficient identity based ring signature“. SSM Chow, SM Yiu, LCK Hui. 2005. Springer International Conference on Applied …. 164 cites.
  30. Deniable ring authentication“. M Naor. 2002. Springer Crypto. 158 cites.
  31. Disc galaxies with multiple triaxial structures. II. JHK surface photometry and numerical simulations“. D Friedli, H Wozniak, M Rieke, L Martinet…. 1996. aas.aanda.org Astronomy and …. 158 cites.
  32. New Proxy Signature, Proxy Blind Signature and Proxy Ring Signature Schemes from Bilinear Pairing.“. F Zhang, R Safavi-Naini, CY Lin. 2003. eprint.iacr.org IACR Cryptology EPrint Archive. 154 cites.
  33. Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map.“. F Laguillaumie, D Vergnaud. 2004. Springer SCN. 152 cites.
  34. Forking lemmas for ring signature schemes“. J Herranz, G Sáez. 2003. Springer International Conference on Cryptology in India. 151 cites.
  35. Charm: a framework for rapidly prototyping cryptosystems“. JA Akinyele, C Garman, I Miers, MW Pagano…. 2013. Springer Journal of Cryptographic …. 150 cites.
  36. Blacklistable anonymous credentials: blocking misbehaving users without ttps“. PP Tsang, MH Au, A Kapadia, SW Smith. 2007. dl.acm.org Proceedings of the 14th ACM …. 149 cites.
  37. Batch Verifications with ID-Based Signatures.“. HJ Yoon, JH Cheon, Y Kim. 2004. Springer ICISC. 148 cites.
  38. Oruta: Privacy-preserving public auditing for shared data in the cloud“. B Wang, B Li, H Li. 2014. ieeexplore.ieee.org IEEE transactions on cloud computing. 144 cites.
  39. Hidden attribute-based signatures without anonymity revocation“. J Li, K Kim. 2010. Elsevier Information Sciences. 139 cites.
  40. Efficient ring signatures without random oracles“. H Shacham, B Waters. 2007. Springer Public Key Cryptography. 130 cites.
  41. ID-based ring signature and proxy ring signature schemes from bilinear pairings“. AK Awasthi, S Lal. 2005. arxiv.org arXiv preprint cs/0504097. 130 cites.
  42. Short linkable ring signatures for e-voting, e-cash and attestation“. PP Tsang, VK Wei. 2005. Springer ISPEC. 121 cites.
  43. On the generic construction of identity-based signatures with additional properties“. D Galindo, J Herranz, E Kiltz. 2006. Springer Asiacrypt. 117 cites.
  44. Dissent: accountable anonymous group messaging“. H Corrigan-Gibbs, B Ford. 2010. dl.acm.org Proceedings of the 17th ACM conference on …. 116 cites.
  45. Efficient attribute-based signatures for non-monotone predicates in the standard model“. T Okamoto, K Takashima. 2011. Springer International Workshop on Public Key …. 114 cites.
  46. Dating past geomorphic processes with tangential rows of traumatic resin ducts“. M Stoffel. 2008. Elsevier Dendrochronologia. 108 cites.
  47. Multi-designated verifiers signatures“. F Laguillaumie, D Vergnaud. 2004. Springer ICICS. 107 cites.
  48. Charged particle depletion surrounding Saturn’s F ring: Evidence for a moonlet belt?“. JN Cuzzi, JA Burns. 1988. Elsevier Icarus. 106 cites.
  49. Trustworthy privacy-preserving car-generated announcements in vehicular ad hoc networks“. V Daza, J Domingo-Ferrer, F Sebé…. 2009. ieeexplore.ieee.org IEEE Transactions on …. 106 cites.
  50. Identity based undeniable signatures“. B Libert, JJ Quisquater. 2004. Springer CT-RSA. 100 cites.
  51. Voyager planetary radio astronomy at Neptune“. JW Warwick, DR Evans, GR Peltzer, RG Peltzer…. 1989. search.proquest.com Science. 98 cites.
  52. ID-based ring signature scheme secure in the standard model“. MH Au, JK Liu, TH Yuen, DS Wong. 2006. Springer International Workshop on Security. 97 cites.
  53. Mesh signatures“. X Boyen. 2007. Springer Annual International Conference on the Theory and …. 97 cites.
  54. New identity-based ring signature schemes“. J Herranz, G Sáez. 2004. Springer ICICS. 97 cites.
  55. Perfect concurrent signature schemes“. W Susilo, Y Mu, F Zhang. 2004. Springer Information and Communications Security. 96 cites.
  56. Cyberentity security in the internet of things“. H Ning, H Liu, LT Yang. 2013. ieeexplore.ieee.org Computer. 94 cites.
  57. Identity Based Threshold Ring Signature.“. SSM Chow, LCK Hui, SM Yiu. 2004. Springer ICISC. 92 cites.
  58. New approaches for deniable authentication“. M Di Raimondo, R Gennaro. 2005. dl.acm.org Proceedings of the 12th ACM conference …. 91 cites.
  59. Palaeoflood records for the Red River, Manitoba, Canada, derived from anatomical tree-ring signatures“. SS George, E Nielsen. 2003. journals.sagepub.com The Holocene. 91 cites.
  60. Attribute Based Group Signatures.“. D Khader. 2007. eprint.iacr.org IACR Cryptology ePrint Archive. 90 cites.
  61. Separable Linkable Threshold Ring Signatures.“. PP Tsang, VK Wei, TK Chan, MH Au, JK Liu, DS Wong. 2004. Springer Indocrypt. 90 cites.
  62. Short Attribute-Based Signatures for Threshold Predicates.“. J Herranz, F Laguillaumie, B Libert, C Ràfols. 2012. Springer CT-RSA. 89 cites.
  63. Identity-based ring signcryption schemes: cryptographic primitives for preserving privacy and authenticity in the ubiquitous world“. X Huang, W Susilo, Y Mu…. 2005. ieeexplore.ieee.org … Information Networking and …. 86 cites.
  64. Ring signatures without random oracles“. SSM Chow, VK Wei, JK Liu, TH Yuen. 2006. dl.acm.org … of the 2006 ACM Symposium on …. 86 cites.
  65. A New ID-based Signature with Batch Verification.“. JH Cheon, Y Kim, HJ Yoon. 2004. icms.kaist.ac.kr IACR Cryptology EPrint Archive. 83 cites.
  66. Ring signatures of sub-linear size without random oracles“. N Chandran, J Groth, A Sahai. 2007. Springer Automata, Languages and Programming. 82 cites.
  67. Certificate based (linkable) ring signature“. MH Au, JK Liu, W Susilo, TH Yuen. 2007. Springer International Conference on …. 81 cites.
  68. On the Portability of Generalized Schnorr Proofs.“. J Camenisch, A Kiayias, M Yung. 2009. Springer EUROCRYPT. 81 cites.
  69. Short designated verifier signature scheme and its identity-based variant“. X Huang, W Susilo, Y Mu, F Zhang. 2008. ro.uow.edu.au . 80 cites.
  70. User-private information retrieval based on a peer-to-peer community“. J Domingo-Ferrer, M Bras-Amorós, Q Wu…. 2009. Elsevier Data & Knowledge …. 78 cites.
  71. Property-based attestation without a trusted third party“. L Chen, H Löhr, M Manulis, AR Sadeghi. 2008. Springer Information Security. 77 cites.
  72. Survey on anonymous communications in computer networks“. J Ren, J Wu. 2010. Elsevier Computer Communications. 76 cites.
  73. Attribute-Based Ring Signatures.“. J Li, K Kim. 2008. researchgate.net IACR Cryptology EPrint Archive. 75 cites.
  74. Policy-based cryptography and applications“. W Bagga, R Molva. 2005. Springer Financial Cryptography. 75 cites.
  75. Revocable attribute-based signatures with adaptive security in the standard model“. A Escala, J Herranz, P Morillo. 2011. Springer Progress in Cryptology–AFRICACRYPT …. 74 cites.
  76. Tree-ring response of Populus tremula L. and Quercus robur L. to recent spring floods of the Saône River, France“. L Astrade, Y Bégin. 1997. Taylor & Francis Ecoscience. 73 cites.
  77. The power of proofs-of-possession: Securing multiparty signatures against rogue-key attacks“. T Ristenpart, S Yilek. 2007. Springer Eurocrypt. 72 cites.
  78. A separable threshold ring signature scheme“. JK Liu, VK Wei, DS Wong. 2003. Springer International Conference on Information …. 70 cites.
  79. Footprint: detecting Sybil attacks in urban vehicular networks“. S Chang, Y Qi, H Zhu, J Zhao…. 2012. ieeexplore.ieee.org IEEE Transactions on …. 70 cites.
  80. A new efficient threshold ring signature scheme based on coding theory“. CA Melchor, PL Cayrel, P Gaborit…. 2011. ieeexplore.ieee.org IEEE Transactions on …. 69 cites.
  81. How to leak a secret: Theory and applications of ring signatures“. RL Rivest, A Shamir, Y Tauman. 2006. Springer Essays in memory of Shimon Even. 68 cites.
  82. Calibration of floodplain roughness and estimation of flood discharge based on tree-ring evidence and hydraulic modelling“. JA Ballesteros, JM Bodoque, A Díez-Herrero…. 2011. Elsevier Journal of …. 67 cites.
  83. Decentralized Attribute-Based Signatures.“. T Okamoto, K Takashima. 2013. Springer Public Key Cryptography. 67 cites.
  84. Historical patterns of western spruce budworm and Douglas-fir tussock moth outbreaks in the northern Blue Mountains, Oregon, since AD 1700.“. TW Swetnam, BE Wickman, HG Paul, CH Baisan. 1995. researchgate.net . 67 cites.
  85. Cryptography from pairings“. KG Paterson. 2006. win.tue.nl London mathematical society lecture note series. 66 cites.
  86. Claromatic carbon nanostructures“. AT Balaban, DJ Klein. 2009. ACS Publications The Journal of Physical Chemistry C. 64 cites.
  87. Identity based strong designated verifier signature scheme“. PK Kancharla, S Gummadidala, A Saxena. 2007. content.iospress.com Informatica. 64 cites.
  88. Privacy in content-oriented networking: Threats and countermeasures“. A Chaabane, E De Cristofaro, MA Kaafar…. 2013. dl.acm.org ACM SIGCOMM …. 64 cites.
  89. A hydrographic section from South Africa to the southern limit of the Antarctic Circumpolar Current at the Greenwich meridian“. S Gladyshev, M Arhan, A Sokov, S Speich. 2008. Elsevier Deep Sea Research Part I …. 62 cites.
  90. An identity-based ring signature scheme from bilinear pairings“. CY Lin, TC Wu. 2004. ieeexplore.ieee.org … Networking and Applications, 2004. AINA 2004 …. 62 cites.
  91. Analytic Novikov for topologists“. J Rosenberg. 1995. mmas.univ-metz.fr Novikov conjectures, index theorems and rigidity. 62 cites.
  92. The fairness of perfect concurrent signatures“. G Wang, F Bao, J Zhou. 2006. Springer Information and Communications Security. 62 cites.
  93. K-anonymous secret handshakes with reusable credentials“. S Xu, M Yung. 2004. dl.acm.org Proceedings of the 11th ACM conference on Computer …. 60 cites.
  94. Location privacy in urban sensing networks: research challenges and directions [security and privacy in emerging wireless networks]“. I Krontiris, FC Freiling, T Dimitriou. 2010. ieeexplore.ieee.org IEEE Wireless …. 60 cites.
  95. Cost-effective authentic and anonymous data sharing with forward security“. X Huang, JK Liu, S Tang, Y Xiang…. 2015. ieeexplore.ieee.org IEEE Transactions …. 59 cites.
  96. Predicting photometric and spectroscopic signatures of rings around transiting extrasolar planets“. Y Ohta, A Taruya, Y Suto. 2008. iopscience.iop.org The Astrophysical Journal. 59 cites.
  97. The dust halo of Saturn’s largest icy moon, Rhea“. GH Jones, E Roussos, N Krupp, U Beckmann…. 2008. science.sciencemag.org …. 59 cites.
  98. Formation and evolution of planetary systems: upper limits to the gas mass in HD 105“. D Hollenbach, U Gorti, M Meyer, JS Kim…. 2005. iopscience.iop.org The Astrophysical …. 58 cites.
  99. Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model.“. B Libert, D Vergnaud. 2009. Springer CANS. 58 cites.
  100. Traceable ring signature“. E Fujisaki, K Suzuki. 2007. Springer Public Key Cryptography. 58 cites.
  101. Ring signatures: Stronger definitions, and constructions without random oracles“. A Bender, J Katz, R Morselli. 2009. Springer Journal of Cryptology. 57 cites.
  102. Generic construction of (identity-based) perfect concurrent signatures“. SSM Chow, W Susilo. 2005. Springer International Conference on Information and …. 56 cites.
  103. On the RS-code construction of ring signature schemes and a threshold setting of RST“. DS Wong, K Fung, JK Liu, VK Wei. 2003. Springer ICICS. 55 cites.
  104. Efficient zero-knowledge authentication based on a linear algebra problem MinRank“. N Courtois. 2001. Springer ASIACRYPT. 54 cites.
  105. Short linkable ring signatures revisited“. MH Au, SSM Chow, W Susilo, PP Tsang. 2006. Springer European Public Key …. 54 cites.
  106. An identity-based ring signature scheme with enhanced privacy“. C Gamage, B Gras, B Crispo…. 2006. ieeexplore.ieee.org … and Workshops, 2006. 53 cites.
  107. Privacy-preserving public auditing for shared cloud data supporting group dynamics“. B Wang, H Li, M Li. 2013. ieeexplore.ieee.org Communications (ICC), 2013 IEEE …. 53 cites.
  108. Convertible ring signature“. KC Lee, HA Wen, T Hwang. 2005. IET IEE Proceedings-Communications. 52 cites.
  109. Efficient optimistic fair exchange secure in the multi-user setting and chosen-key model without random oracles“. Q Huang, G Yang, DS Wong, W Susilo. 2008. Springer Lecture Notes in Computer …. 52 cites.
  110. Ambiguous optimistic fair exchange“. Q Huang, G Yang, DS Wong, W Susilo. 2008. Springer … on the Theory and Application of …. 51 cites.
  111. Asymmetric concurrent signatures“. K Nguyen. 2005. Springer ICICS. 51 cites.
  112. Threshold Attribute-Based Signcryption.“. M Gagné, S Narayan, R Safavi-Naini. 2010. Springer SCN. 51 cites.
  113. Certificateless threshold ring signature“. S Chang, DS Wong, Y Mu, Z Zhang. 2009. Elsevier Information Sciences. 50 cites.
  114. Generalized digital certificate for user authentication and key establishment for secure communications“. L Harn, J Ren. 2011. ieeexplore.ieee.org IEEE Transactions on Wireless …. 50 cites.
  115. Identity-based ring signatures from RSA“. J Herranz. 2007. Elsevier Theoretical Computer Science. 50 cites.
  116. Linkable ring signatures: Security models and new schemes“. JK Liu, DS Wong. 2005. Springer … Conference on Computational Science and Its …. 50 cites.
  117. Anonymous proxy signatures“. G Fuchsbauer, D Pointcheval. 2008. Springer … on Security and Cryptography for Networks. 49 cites.
  118. Toward the fair anonymous signatures: Deniable ring signatures“. Y Komano, K Ohta, A Shimbo, S Kawamura. 2006. Springer CT-RSA. 48 cites.
  119. Policy-Based Signatures.“. M Bellare, G Fuchsbauer. 2014. eprint.iacr.org Public Key Cryptography. 47 cites.
  120. Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.“. C Chen, J Chen, HW Lim, Z Zhang, D Feng, S Ling…. 2013. Springer CT-RSA. 46 cites.
  121. Multi-party concurrent signatures“. D Tonien, W Susilo, R Safavi-Naini. 2006. Springer ISC. 46 cites.
  122. Non-interactive deniable ring authentication“. W Susilo, Y Mu. 2003. Springer International Conference on Information Security and …. 46 cites.
  123. Routes of Agulhas rings in the southeastern Cape Basin“. G Dencausse, M Arhan, S Speich. 2010. Elsevier Deep Sea Research Part I …. 46 cites.
  124. Universal designated verifier signatures without random oracles or non-black box assumptions“. F Laguillaumie, B Libert, JJ Quisquater. 2006. Springer SCN. 44 cites.
  125. A ring signature scheme using bilinear pairings“. J Xu, Z Zhang, D Feng. 2004. Springer International Workshop on Information Security …. 43 cites.
  126. Composability and On-Line Deniability of Authentication.“. Y Dodis, J Katz, AD Smith, S Walfish. 2009. Springer TCC. 43 cites.
  127. Identity based ring signature: Why, how and what next“. SSM Chow, RWC Lui, LCK Hui, SM Yiu. 2005. Springer EuroPKI. 43 cites.
  128. On the security models of (threshold) ring signature schemes“. JK Liu, DS Wong. 2004. Springer International Conference on Information Security and …. 43 cites.
  129. A suite of non-pairing id-based threshold ring signature schemes with different levels of anonymity“. PP Tsang, MH Au, JK Liu, W Susilo, DS Wong. 2010. Springer ProvSec. 42 cites.
  130. Finding composite order ordinary elliptic curves using the Cocks–Pinch method“. D Boneh, K Rubin, A Silverberg. 2011. Elsevier Journal of Number Theory. 42 cites.
  131. Revocable ring signature“. DYW Liu, JK Liu, Y Mu, W Susilo, DS Wong. 2007. Springer Journal of Computer Science …. 41 cites.
  132. The Tree-Ring Record of Drought on the Canadian Prairies a, b“. S St. George, DM Meko, MP Girardin…. 2009. journals.ametsoc.org Journal of …. 41 cites.
  133. A Framework for Efficient Signatures, Ring Signatures and Identity Based Encryption in the Standard Model.“. Z Brakerski, YT Kalai. 2010. microsoft.com IACR Cryptology ePrint Archive. 40 cites.
  134. A provably secure ring signature scheme in certificateless cryptography“. L Zhang, F Zhang, W Wu. 2007. Springer provsec. 40 cites.
  135. On the security of auditing mechanisms for secure cloud storage“. Y Yu, L Niu, G Yang, Y Mu, W Susilo. 2014. Elsevier Future Generation Computer Systems. 39 cites.
  136. Security, privacy, and accountability in wireless access networks“. W Lou, K Ren. 2009. ieeexplore.ieee.org IEEE Wireless Communications. 39 cites.
  137. Automatic classification of spatial signatures on semiconductor wafermaps“. KW Tobin, SS Gleason…. 1997. proceedings.spiedigitallibrary.org SPIE’s 22nd …. 38 cites.
  138. One-Time Signatures and Chameleon Hash Functions.“. P Mohassel. 2010. Springer Selected Areas in Cryptography. 38 cites.
  139. Solutions to Key Exposure Problem in Ring Signature.“. JK Liu, DS Wong. 2008. eprint.iacr.org IJ Network Security. 38 cites.
  140. A Lattice-Based Threshold Ring Signature Scheme.“. PL Cayrel, R Lindner, M Rückert, R Silva. 2010. Springer LATINCRYPT. 37 cites.
  141. Efficient and spontaneous privacy-preserving protocol for secure vehicular communication“. H Xiong, K Beznosov, Z Qin…. 2010. ieeexplore.ieee.org … (ICC), 2010 IEEE …. 37 cites.
  142. Tripartite concurrent signatures“. W Susilo, Y Mu. 2005. Springer Security and Privacy in the Age of Ubiquitous …. 37 cites.
  143. Blind spontaneous anonymous group signatures for ad hoc groups“. TK Chan, K Fung, JK Liu, VK Wei. 2004. Springer ESAS. 36 cites.
  144. Verifiable ring signature“. J Lv, X Wang. 2003. sites.google.com Proc. of DMS 2003-The 9th International …. 36 cites.
  145. Anonymous Webs of Trust.“. M Backes, S Lorenz, M Maffei, K Pecina. 2010. Springer Privacy Enhancing Technologies. 35 cites.
  146. Improved short lattice signatures in the standard model“. L Ducas, D Micciancio. 2014. Springer International Cryptology Conference. 35 cites.
  147. List signature schemes“. S Canard, B Schoenmakers, M Stam…. 2006. Elsevier Discrete Applied …. 35 cites.
  148. Quasi-Dyadic CFS Signatures.“. PSLM Barreto, PL Cayrel, R Misoczki, R Niebuhr. 2010. Springer Inscrypt. 35 cites.
  149. Subpixel image registration using circular fiducials“. A Efrat, C Gotsman. 1994. World Scientific International Journal of Computational …. 35 cites.
  150. Archaeological tree-ring dating at the millennium“. SE Nash. 2002. Springer Journal of Archaeological Research. 34 cites.
  151. Constant-size ID-based linkable and revocable-iff-linked ring signature“. MH Au, JK Liu, W Susilo, TH Yuen. 2006. Springer InDOcRYPT. 34 cites.
  152. Fighting phishing attacks: A lightweight trust architecture for detecting spoofed emails“. B Adida, S Hohenberger…. 2005. pdfs.semanticscholar.org DIMACS Wkshp on …. 34 cites.
  153. Role-dependent privacy preservation for secure V2G networks in the smart grid“. H Liu, H Ning, Y Zhang, Q Xiong…. 2014. ieeexplore.ieee.org IEEE Transactions on …. 34 cites.
  154. Universal designated verifier ring signature (proof) without random oracles“. J Li, Y Wang. 2006. Springer EUC Workshops. 34 cites.
  155. Escrowed linkability of ring signatures and its applications“. SSM Chow, W Susilo, TH Yuen. 2006. Springer VIETCRYPT. 33 cites.
  156. Provably Secure Code-Based Threshold Ring Signatures.“. L Dallot, D Vergnaud. 2009. Springer IMA Int. Conf.. 33 cites.
  157. A survey of ring signature“. L Wang, G Zhang, C Ma. 2008. Springer Frontiers of Electrical and Electronic Engineering …. 32 cites.
  158. An efficient and provable secure identity-based ring signcryption scheme“. ZC Zhu, Y Zhang, F Wang. 2009. Elsevier Computer standards & interfaces. 32 cites.
  159. Blind ring signatures secure under the chosen-target-CDH assumption“. J Herranz, F Laguillaumie. 2006. Springer ISC. 32 cites.
  160. Fully Anonymous Attribute Tokens from Lattices.“. J Camenisch, G Neven, M Rückert. 2012. Springer SCN. 32 cites.
  161. Short group signatures with controllable linkability“. JY Hwang, S Lee, BH Chung, HS Cho…. 2011. ieeexplore.ieee.org … Security & Privacy …. 32 cites.
  162. Anonymity 2.0-X. 509 extensions supporting privacy-friendly authentication“. V Benjumea, SG Choi, J Lopez, M Yung. 2007. Springer CANS. 31 cites.
  163. Multi-designated verifiers signatures: anonymity without encryption“. F Laguillaumie, D Vergnaud. 2007. Elsevier Information Processing Letters. 31 cites.
  164. Proxy ring signature: formal definitions, efficient construction and new variant“. J Li, TH Yuen, X Chen, Y Wang. 2006. ieeexplore.ieee.org … Intelligence and Security …. 31 cites.
  165. Robust Receipt-Free Election System with Ballot Secrecy and Verifiability.“. SSM Chow, JK Liu, DS Wong. 2008. internetsociety.org NDSS. 31 cites.
  166. Towards an anonymous access control and accountability scheme for cloud computing“. M Jensen, S Schäge, J Schwenk. 2010. ieeexplore.ieee.org Cloud Computing (CLOUD) …. 31 cites.
  167. Cryptanalysis and improvement of an ID-based ad-hoc anonymous identification scheme at CT-RSA 05“. F Zhang, X Chen. 2009. Elsevier Information Processing Letters. 30 cites.
  168. Deniable ring authentication revisited“. W Susilo, Y Mu. 2004. Springer ACNS. 30 cites.
  169. Anonymous authentication“. Y Lindell. 2007. repository.cmu.edu Journal of Privacy and Confidentiality. 29 cites.
  170. Maximum eigenvalues of the reciprocal distance matrix and the reverse Wiener matrix“. B Zhou, N Trinajstić. 2008. Wiley Online Library International Journal of Quantum …. 29 cites.
  171. Designated verifier signature: definition, framework and new constructions“. Y Li, W Susilo, Y Mu, D Pei. 2007. Springer Ubiquitous Intelligence and Computing. 28 cites.
  172. Macrofossil and tree-ring evidence for a long-term forest succession and mid-Holocene hemlock decline“. L Filion, F Quinty. 1993. Elsevier Quaternary Research. 28 cites.
  173. Security and privacy in wireless sensor networks“. A Ukil. 2010. intechopen.com Smart Wireless Sensor Networks. 28 cites.
  174. A new ring signature scheme with signer-admission property“. CH Wang, CY Liu. 2007. Elsevier Information Sciences. 27 cites.
  175. Cutting through the Confusion: A Measurement Study of Homograph Attacks.“. T Holgers, DE Watson, SD Gribble. 2006. static.usenix.org USENIX Annual Technical …. 27 cites.
  176. Efficient secret authenticatable anonymous signcryption scheme with identity privacy“. M Zhang, B Yang, S Zhu, W Zhang. 2008. Springer International Conference on …. 27 cites.
  177. A novel verifiably encrypted signature scheme without random oracle“. J Zhang, J Mao. 2007. Springer … Conference on Information Security Practice and …. 26 cites.
  178. Efficient and multi-level privacy-preserving communication protocol for VANET“. H Xiong, Z Chen, F Li. 2012. Elsevier Computers & Electrical Engineering. 26 cites.
  179. Providing hop-by-hop authentication and source privacy in wireless sensor networks“. Y Li, J Li, J Ren, J Wu. 2012. ieeexplore.ieee.org INFOCOM, 2012 Proceedings IEEE. 26 cites.
  180. A-Train observations of deep convective storm tops“. M Setvák, K Bedka, DT Lindsey, A Sokol, Z Charvát…. 2013. Elsevier Atmospheric …. 25 cites.
  181. Certificateless Ring Signatures.“. SSM Chow, WS Yap. 2007. eprint.iacr.org IACR Cryptology ePrint Archive. 25 cites.
  182. Generalized ring signatures“. J Ren, L Harn. 2008. ieeexplore.ieee.org IEEE Transactions on Dependable and Secure …. 25 cites.
  183. On the security of an identity based multi-proxy signature scheme“. H Xiong, J Hu, Z Chen, F Li. 2011. Elsevier Computers & Electrical Engineering. 25 cites.
  184. On the security of an identity based multi-proxy signature scheme“. H Xiong, J Hu, Z Chen, F Li. 2011. Elsevier Computers & Electrical Engineering. 25 cites.
  185. PPAA: Peer-to-peer anonymous authentication“. P Tsang, S Smith. 2008. Springer Applied Cryptography and Network Security. 25 cites.
  186. Server-aided signatures verification secure against collusion attack“. SSM Chow, MH Au, W Susilo. 2013. Elsevier Information Security Technical Report. 25 cites.
  187. Construction of universal designated-verifier signatures and identity-based signatures from standard signatures“. S Shahandashti, R Safavi-Naini. 2008. Springer Public Key Cryptography–PKC 2008. 24 cites.
  188. Electronic group signature method with revocable anonymity, equipment and programs for implementing the method“. DA Modiano, L Frisch, D Mouton. 2009. Google Patents US Patent 7,526,651. 24 cites.
  189. ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things“. J Su, D Cao, B Zhao, X Wang, I You. 2014. Elsevier Future Generation Computer Systems. 24 cites.
  190. Extended Artin-Schreier theory of fields“. E Becker. 1984. JSTOR The Rocky Mountain Journal of Mathematics. 24 cites.
  191. Lightweight email signatures“. B Adida, D Chau, S Hohenberger, RL Rivest. 2006. Springer SCN. 24 cites.
  192. Tracing-by-linking group signatures“. V Wei. 2005. Springer Information Security. 24 cites.
  193. A Novel ID-Based Anonymous Signcryption Scheme.“. J Zhang, S Gao, H Chen, Q Geng. 2009. Springer APWeb/WAIM. 23 cites.
  194. Analysis and improvements of two identity-based perfect concurrent signature schemes“. Z Huang, K Chen, X Lin, R Huang. 2007. content.iospress.com Informatica. 23 cites.
  195. Code-based Ring Signature Scheme.“. D Zheng, X Li, K Chen. 2007. pdfs.semanticscholar.org IJ Network Security. 23 cites.
  196. Domain-specific pseudonymous signatures for the German identity card“. J Bender, Ö Dagdelen, M Fischlin, D Kügler. 2012. Springer Information Security. 23 cites.
  197. Privacy-preserving smart metering with regional statistics and personal enquiry services“. CK Chu, JK Liu, JW Wong, Y Zhao, J Zhou. 2013. dl.acm.org Proceedings of the 8th ACM …. 23 cites.
  198. Self-organized Anonymous Authentication in Mobile Ad Hoc Networks.“. J Freudiger, M Raya, JP Hubaux. 2009. Springer SecureComm. 23 cites.
  199. Separable identity-based ring signatures: Theoretical foundations for fighting phishing attacks“. B Adida, S Hohenberger…. 2005. pdfs.semanticscholar.org … of DIMACS Workshop …. 23 cites.
  200. Tree ring effects and ice core acidities clarify the volcanic record of the first millennium“. MGL Baillie, J McAneney. 2015. clim-past.net Climate of the Past. 23 cites.
  201. Bidder-anonymous English auction protocol based on revocable ring signature“. H Xiong, Z Chen, F Li. 2012. Elsevier Expert Systems with Applications. 22 cites.
  202. Linkable democratic group signatures“. M Manulis, AR Sadeghi, J Schwenk. 2006. Springer International Conference on …. 22 cites.
  203. Traceable ring signature“. E Fujisaki, K Suzuki. 2008. search.ieice.org IEICE transactions on fundamentals of …. 22 cites.
  204. A simple transitive signature scheme for directed trees“. G Neven. 2008. Elsevier Theoretical Computer Science. 21 cites.
  205. Accumulators and U-Prove revocation“. T Acar, SSM Chow, L Nguyen. 2013. Springer International Conference on Financial …. 21 cites.
  206. How to compress Rabin ciphertexts and signatures (and more)“. C Gentry. 2004. Springer Advances in Cryptology–CRYPTO 2004. 21 cites.
  207. How to share a secret“. RL Rivest, A Shamir, Y Tauman. 1979. Citeseer Communications of the ACM. 21 cites.
  208. A provably secure ID-based ring signature scheme.“. J Herranz, G Sáez. 2003. eprint.iacr.org IACR Cryptology ePrint Archive. 20 cites.
  209. An efficient anonymous authentication mechanism for delay tolerant networks“. R Su, Z Cao. 2010. Elsevier Computers & Electrical Engineering. 20 cites.
  210. Anonymous signatures made easy“. M Fischlin. 2007. Springer Public Key Cryptography. 20 cites.
  211. Attribute Based Signatures for Bounded Multi-level Threshold Circuits.“. S Kumar, S Agrawal, S Balaraman, CP Rangan. 2010. Springer EuroPKI. 20 cites.
  212. Cyclic conjugation in fluoranthene and its benzo-derivatives. Part 1. Catacondensed systems“. J Đurđević, I Gutman, J Terzić…. 2009. Taylor & Francis Polycyclic Aromatic …. 20 cites.
  213. Efficient and strongly unforgeable identity‐based signature scheme from lattices in the standard model“. Z Liu, Y Hu, X Zhang, F Li. 2013. Wiley Online Library Security and communication …. 20 cites.
  214. Forward Secure Ring Signature without Random Oracles.“. JK Liu, TH Yuen, J Zhou. 2011. Springer ICICS. 20 cites.
  215. Providing source privacy in mobile ad hoc networks“. J Ren, Y Li, T Li. 2009. ieeexplore.ieee.org Mobile Adhoc and Sensor Systems, 2009 …. 20 cites.
  216. Sanitizable Signatures Revisited.“. TH Yuen, W Susilo, JK Liu, Y Mu. 2008. Springer CANS. 20 cites.
  217. Secure ID-based linkable and revocable-iff-linked ring signature with constant-size construction“. MH Au, JK Liu, W Susilo, TH Yuen. 2013. Elsevier Theoretical Computer Science. 20 cites.
  218. π-Electron partitions, signatures, and Clar structures of selected benzenoid hydrocarbons“. AT Balaban, M Pompe, M Randić. 2008. ACS Publications The Journal of Physical …. 20 cites.
  219. Group-oriented fair exchange of signatures“. Q Huang, DS Wong, W Susilo. 2011. Elsevier Information Sciences. 19 cites.
  220. On perspective of security and privacy-preserving solutions in the internet of things“. L Malina, J Hajny, R Fujdiak, J Hosek. 2016. Elsevier Computer Networks. 19 cites.
  221. Resisting Traitors in Linkable Democratic Group Signatures.“. MH Ibrahim. 2009. ijns.jalaxy.com.tw IJ Network Security. 19 cites.
  222. Ring signature with designated linkability“. JK Liu, W Susilo, DS Wong. 2006. Springer International Workshop on Security. 19 cites.
  223. Sub-linear Size Traceable Ring Signatures without Random Oracles.“. E Fujisaki. 2011. Springer CT-RSA. 19 cites.
  224. The SPARTA pseudonym and authorization system“. G Bianchi, M Bonola, V Falletta, FS Proto…. 2008. Elsevier Electronic Notes in …. 19 cites.
  225. A CDH-Based Ring Signature Scheme with Short Signatures and Public Keys.“. S Schäge, J Schwenk. 2010. Springer Financial Cryptography. 18 cites.
  226. Constructing strong identity-based designated verifier signatures with self-unverifiability“. JH Ki, JY Hwang, DH Nyang, BH Chang, DH Lee, J Lim. 2012. etrij.etri.re.kr ETRI Journal. 18 cites.
  227. Enhanced security models and a generic construction approach for linkable ring signature“. JK Liu, DS Wong. 2006. World Scientific … Journal of Foundations of Computer Science. 18 cites.
  228. G2C: Cryptographic Protocols from Goal-Driven Specifications.“. M Backes, M Maffei, K Pecina, RM Reischuk. 2011. Springer TOSCA. 18 cites.
  229. Ring signature schemes for general ad-hoc access structures“. J Herranz, G Sáez. 2004. Springer ESAS. 18 cites.
  230. Signature schemes with efficient protocols and dynamic group signatures from lattice assumptions“. B Libert, S Ling, F Mouhartem, K Nguyen…. 2016. Springer Advances in Cryptology …. 18 cites.
  231. Strontium isotopic and tree-ring signatures of Cedrus brevifolia in Cyprus“. S Rich, SW Manning, P Degryse…. 2012. pubs.rsc.org Journal of Analytical …. 18 cites.
  232. A Certificateless Proxy Ring Signature Scheme with Provable Security.“. H Xiong, Z Qin, F Li. 2011. pdfs.semanticscholar.org IJ Network Security. 17 cites.
  233. An efficient static blind ring signature scheme“. Q Wu, F Zhang, W Susilo, Y Mu. 2005. Springer ICISC. 17 cites.
  234. Attribute-based ring signature scheme with constant-size signature“. W Wenqiang, C Shaozhen. 2010. IET IET Information Security. 17 cites.
  235. Ip address authorization for secure address proxying using multi-key cgas and ring signatures“. J Kempf, J Wood, Z Ramzan, C Gentry. 2006. Springer Advances in Information and …. 17 cites.
  236. Linkable ring signature with unconditional anonymity“. JK Liu, MH Au, W Susilo, J Zhou. 2014. ieeexplore.ieee.org IEEE Transactions on …. 17 cites.
  237. Review of nucleon decay searches at Super-Kamiokande“. V Takhistov. 2016. arxiv.org arXiv preprint arXiv:1605.03235. 17 cites.
  238. Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors“. B Libert, S Ling, K Nguyen, H Wang. 2016. Springer … on the Theory and Applications of …. 17 cites.
  239. A secure ring signcryption scheme for private and anonymous communication“. L Wang, G Zhang, C Ma. 2007. ieeexplore.ieee.org Network and Parallel Computing …. 16 cites.
  240. Attribute‐based ring signcryption scheme“. Z Guo, M Li, X Fan. 2013. Wiley Online Library Security and Communication Networks. 16 cites.
  241. One-out-of-many proofs: Or how to leak a secret and spend a coin“. J Groth, M Kohlweiss. 2015. discovery.ucl.ac.uk EUROCRYPT (2). 16 cites.
  242. Post-quantum Cryptography: Code-Based Signatures.“. PL Cayrel, M Meziani. 2010. Springer AST/UCMA/ISA/ACN. 16 cites.
  243. Private reputation schemes for p2p systems“. C Boyd, R Ismail, A Josang, S Russell. 2004. eprints.qut.edu.au . 16 cites.
  244. Ring Signature Schemes from Lattice Basis Delegation.“. J Wang, B Sun. 2011. Springer ICICS. 16 cites.
  245. Ring signatures for benzenoids with up to seven rings, Part 1: Catacondensed systems“. M Randić, AT Balaban. 2008. Wiley Online Library International Journal of Quantum …. 16 cites.
  246. Ring signatures for benzenoids with up to seven rings, Part 2: Pericondensed systems“. AT Balaban, M Randić. 2008. Wiley Online Library International Journal of Quantum …. 16 cites.
  247. A formal proof of security of Zhang and Kim’s ID-based ring signature scheme.“. J Herranz. 2004. sefcom.asu.edu WOSIS. 15 cites.
  248. An efficient identity-based ring signature scheme and its extension“. J Zhang. 2007. Springer … Conference on Computational Science and Its …. 15 cites.
  249. An identity-based proxy ring signature scheme from bilinear pairings“. W Cheng, W Lang, Z Yang, G Liu…. 2004. ieeexplore.ieee.org … 2004. Proceedings. ISCC …. 15 cites.
  250. Cryptanalysis of a generalized ring signature scheme“. H Wang, F Zhang, Y Sun. 2009. ieeexplore.ieee.org IEEE Transactions on Dependable …. 15 cites.
  251. Efficient attribute-based signatures for non-monotone predicates in the standard model“. T Okamoto, K Takashima. 2014. ieeexplore.ieee.org IEEE Transactions on Cloud …. 15 cites.
  252. Efficient id-based threshold ring signature scheme“. J Han, X QiuLiang, C Guohua. 2008. ieeexplore.ieee.org Embedded and Ubiquitous …. 15 cites.
  253. Efficient linkable and/or threshold ring signature without random oracles“. TH Yuen, JK Liu, MH Au, W Susilo…. 2012. academic.oup.com The Computer …. 15 cites.
  254. Perfect concurrent signature protocol“. Z Huang, R Huang, X Lin. 2007. ieeexplore.ieee.org Software Engineering, Artificial …. 15 cites.
  255. Restricted universal designated verifier signature“. X Huang, W Susilo, Y Mu, F Zhang. 2006. Springer UIC. 15 cites.
  256. A promenade through the new cryptography of bilinear pairings“. X Boyen. 2006. ieeexplore.ieee.org Information Theory Workshop, 2006. ITW’06 Punta …. 14 cites.
  257. Anomalous earlywood vessel lumen area in black ash (Fraxinus nigra Marsh.) tree rings as a potential indicator of forest fires“. S Kames, JC Tardif, Y Bergeron. 2011. Elsevier Dendrochronologia. 14 cites.
  258. Anonymity notions for public-key infrastructures in mobile vehicular networks“. G Di Crescenzo, T Zhang…. 2007. ieeexplore.ieee.org Mobile Adhoc and …. 14 cites.
  259. Baumringsignaturen und Wetteranomalien (Eichenbestand Guttenberger Forst, Klimastation Würzburg)“. B Becker, R Glaser. 1991. Springer Forstwissenschaftliches Centralblatt. 14 cites.
  260. GDH group-based signature scheme with linkability“. D Zheng, VK Wei, KF Chen. 2006. IET IEE Proceedings-Communications. 14 cites.
  261. Publicly Verifiable Privacy-Preserving Group Decryption.“. B Qin, Q Wu, W Susilo, Y Mu, Y Wang. 2008. Springer Inscrypt. 14 cites.
  262. Spring flood reconstruction from continuous and discrete tree ring series“. É Boucher, TBMJ Ouarda, Y Bégin…. 2011. Wiley Online Library Water Resources …. 14 cites.
  263. Stem analysis of a long-lived black spruce clone at treeline“. S Payette, A Delwaide, C Morneau, C Lavoie. 1994. JSTOR Arctic and Alpine Research. 14 cites.
  264. A multivariate based threshold ring signature scheme“. A Petzoldt, S Bulygin, J Buchmann. 2013. Springer Applicable Algebra in Engineering …. 13 cites.
  265. Convertible identity-based anonymous designated ring signatures“. Y Chen, W Susilo, Y Mu. 2006. inderscienceonline.com International Journal of Security …. 13 cites.
  266. Gmatch: Secure and privacy-preserving group matching in social networks“. B Wang, B Li, H Li. 2012. ieeexplore.ieee.org Global Communications Conference …. 13 cites.
  267. Location privacy in mobile computing environments“. J Baugh, J Guo. 2006. Springer Ubiquitous Intelligence and Computing. 13 cites.
  268. More short signatures without random oracles.“. VK Wei, TH Yuen. 2005. pdfs.semanticscholar.org IACR Cryptology ePrint Archive. 13 cites.
  269. Multi-Designated Verifiers Signatures Revisited.“. SSM Chow. 2008. pdfs.semanticscholar.org IJ Network Security. 13 cites.
  270. Neutrino superbeams and the magic baseline“. A Asratyan, G Davidenko, A Dolgolenko…. 2003. arxiv.org arXiv preprint hep-ex …. 13 cites.
  271. Ring signature scheme for ECC-based anonymous signcryption“. YF Chung, ZY Wu, TS Chen. 2009. Elsevier Computer Standards & Interfaces. 13 cites.
  272. Step-out ring signatures“. M Klonowski, Ł Krzywiecki, M Kutyłowski…. 2008. Springer … Foundations of Computer …. 13 cites.
  273. Vessel anomalies in Quercus macrocarpa tree rings associated with recent floods along the Red River of the North, United States“. EL Wertz, S St George…. 2013. Wiley Online Library Water Resources Research. 13 cites.
  274. 1-out-of-n signatures from a variety of keys“. M Abe, M Ohkubo, K Suzuki. 2004. search.ieice.org IEICE TRANSACTIONS on …. 12 cites.
  275. A Bilinear Spontaneous Anonymous Threshold Signature for Ad Hoc Groups.“. VK Wei. 2004. pdfs.semanticscholar.org IACR Cryptology ePrint Archive. 12 cites.
  276. A paleoecological analysis of the petrified trees in the Specimen Creek area of Yellowstone National Park, Montana, USA“. A Chadwick, T Yamamoto. 1984. Elsevier Palaeogeography, palaeoclimatology …. 12 cites.
  277. An (n–t)-out-of-n Threshold Ring Signature Scheme“. T Isshiki, K Tanaka. 2005. Springer Australasian Conference on Information Security and …. 12 cites.
  278. An efficient conditionally anonymous ring signature in the random oracle model“. S Zeng, S Jiang, Z Qin. 2012. Elsevier Theoretical Computer Science. 12 cites.
  279. An efficient threshold anonymous authentication scheme for privacy-preserving communications“. J Ren, L Harn. 2013. ieeexplore.ieee.org IEEE Transactions on Wireless …. 12 cites.
  280. Anonymity and application privacy in context of mobile computing in eHealth“. D Slamanig, C Stingl, C Menard…. 2008. Springer … Workshop on Mobile …. 12 cites.
  281. Authenticating with Attributes.“. D Khader. 2008. eprint.iacr.org IACR Cryptology ePrint Archive. 12 cites.
  282. Controllable ring signatures“. W Gao, G Wang, X Wang, D Xie. 2006. Springer WISA. 12 cites.
  283. Diffraction pattern sampling for automatic pattern recognition“. G Stanley, G Lendaris. 1969. pdx.edu Soc. Photo-Opt. Instrum. Eng.. 12 cites.
  284. Distributed Ring Signatures for Identity-Based Scenarios.“. J Herranz, G Sáez. 2004. eprint.iacr.org IACR Cryptology ePrint Archive. 12 cites.
  285. Efficient provable certificateless blind signature scheme“. J Zhang, S Gao. 2010. ieeexplore.ieee.org Networking, Sensing and Control (ICNSC) …. 12 cites.
  286. Efficient threshold signer-ambiguous signatures from variety of keys“. M Abe, M Ohkubo, K Suzuki. 2004. search.ieice.org IEICE Transactions on Fundamentals …. 12 cites.
  287. Fair e-commerce protocols without a third party“. H Li, W Kou, X Du. 2006. ieeexplore.ieee.org … , 2006. ISCC’06. Proceedings. 11th IEEE …. 12 cites.
  288. Hybrid optical-digital radiography-based system for lung disease detection“. RP Kruger, EL Hall, AF Turner. 1977. osapublishing.org Applied optics. 12 cites.
  289. Identity-based anonymous designated ring signatures“. Y Chen, W Susilo, Y Mu. 2006. dl.acm.org … of the 2006 international conference on …. 12 cites.
  290. Method and apparatus for minimizing the telephony ring voltage power supply requirements of an integrated services hub“. E Goodrich II, CL Mahaney. 2005. Google Patents US Patent 6,956,943. 12 cites.
  291. Online/Offline Ring Signature Scheme.“. JK Liu, MH Au, W Susilo, J Zhou. 2009. Springer ICICS. 12 cites.
  292. Security considerations in e-cognocracy“. JJ Piles, JL Salazar, J Ruíz, JM Moreno-Jiménez. 2006. Springer ISCIS. 12 cites.
  293. Topics in Cryptology–CT-RSA 2006: The Cryptographers’ Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005, Proceedings“. D Pointcheval. 2005. books.google.com . 12 cites.
  294. Unique ring signatures: A practical construction“. M Franklin, H Zhang. 2013. Springer … Conference on Financial Cryptography and Data …. 12 cites.
  295. A multi-century tree-ring record of spring flooding on the Mississippi River“. MD Therrell, MB Bialecki. 2015. Elsevier Journal of Hydrology. 11 cites.
  296. A new type of proxy ring signature scheme with revocable anonymity and no info leaked“. C Hu, P Liu, D Li. 2007. Springer Multimedia Content Analysis and Mining. 11 cites.
  297. A search for cold water rings“. RE Cheney. 1981. ntrs.nasa.gov . 11 cites.
  298. Access control in multi-party wireless sensor networks“. J Maerien, S Michiels, C Huygens, D Hughes…. 2013. Springer … Conference on Wireless …. 11 cites.
  299. Accountable ring signatures: A smart card approach“. S Xu, M Yung. 2004. Springer Smart Card Research and Advanced Applications VI. 11 cites.
  300. Ad hoc group signatures“. Q Wu, W Susilo, Y Mu, F Zhang. 2006. Springer International Workshop on Security. 11 cites.
  301. Aggregating cl-signatures revisited: Extended functionality and better efficiency“. K Lee, DH Lee, M Yung. 2013. Springer … Conference on Financial Cryptography and Data …. 11 cites.
  302. Anonymous Signatures Revisited.“. V Saraswat, A Yun. 2009. Springer ProvSec. 11 cites.
  303. Concentric ring signature descriptor for 3d objects“. H Van Nguyen, F Porikli. 2011. ieeexplore.ieee.org Image Processing (ICIP), 2011 18th …. 11 cites.
  304. Cross-identification of ring signatures in Eocene trees (Sequoia magnifica) from the Specimen Ridge locality of the Yellowstone Fossil Forests“. R Ammons, WJ Fritz, RB Ammons…. 1987. Elsevier Palaeogeography …. 11 cites.
  305. Egg shell inspection using global image analysis“. YJ Han, Y Feng. 1994. elibrary.asabe.org Applied engineering in agriculture. 11 cites.
  306. Event-oriented k-times revocable-iff-linked group signatures“. MH Au, W Susilo, SM Yiu. 2006. Springer … Conference on Information Security and Privacy. 11 cites.
  307. Fair exchange signature schemes“. J Liu, R Sun, KS Kwak. 2010. Springer Science China Information Sciences. 11 cites.
  308. Fully Structure-Preserving Signatures and Shrinking Commitments.“. M Abe, M Kohlweiss, M Ohkubo…. 2015. pdfs.semanticscholar.org IACR Cryptology …. 11 cites.
  309. Identity-based chameleon hashing and signatures without key exposure“. X Chen, F Zhang, W Susilo, H Tian, J Li, K Kim. 2014. Elsevier Information Sciences. 11 cites.
  310. On the security of a proxy ring signature with revocable anonymity“. J Zhang, Y Yang. 2009. ieeexplore.ieee.org … Networking and Security, 2009. MINES’09 …. 11 cites.
  311. PPC: Privacy-preserving chatting in vehicular peer-to-peer networks“. X Liang, R Lu, X Lin, X Shen. 2010. ieeexplore.ieee.org … Fall (VTC 2010-Fall), 2010 IEEE …. 11 cites.
  312. Providing witness anonymity in peer-to-peer systems“. B Zhu, S Setia, S Jajodia. 2006. dl.acm.org Proceedings of the 13th ACM conference on …. 11 cites.
  313. Ring signature with weak linkability and its applications“. IR Jeong, JO Kwon, DH Lee. 2008. ieeexplore.ieee.org IEEE Transactions on …. 11 cites.
  314. The Puzzle of the Petrified Trees“. HG Coffin. 1992. christintheclassroom.org Dialogue. 11 cites.
  315. Threshold ring signature without random oracles“. TH Yuen, JK Liu, MH Au, W Susilo, J Zhou. 2011. dl.acm.org Proceedings of the 6th ACM …. 11 cites.
  316. 标准模型下基于双线性对的前向安全环签名方案“. 王玲玲, 张国印, 马春光. 2009. jeit.ie.ac.cn 电子与信息学报. 11 cites.
  317. A New Conditionally Anonymous Ring Signature.“. S Zeng, S Jiang, Z Qin. 2011. Springer COCOON. 10 cites.
  318. A new efficient optimistic fair exchange protocol without random oracles“. Q Huang, G Yang, DS Wong, W Susilo. 2012. Springer International Journal of …. 10 cites.
  319. Anonymous and publicly linkable reputation systems“. J Blömer, J Juhnke, C Kolb. 2015. Springer … on Financial Cryptography and Data Security. 10 cites.
  320. Cryptography and Coding“. MG Parker. 2009. Springer 12th IMA International Conference, Cryptography and …. 10 cites.
  321. Efficient fair exchange from identity-based signature“. DH Yum, PJ Lee. 2008. search.ieice.org IEICE transactions on fundamentals of …. 10 cites.
  322. Forward Secure Attribute-Based Signatures.“. TH Yuen, JK Liu, X Huang, MH Au, W Susilo, J Zhou. 2012. Springer ICICS. 10 cites.
  323. Further observations on optimistic fair exchange protocols in the multi-user setting“. X Huang, Y Mu, W Susilo, W Wu, Y Xiang. 2010. Springer International Workshop on …. 10 cites.
  324. ID-based ring authenticated encryption“. T Cao, D Lin, R Xue. 2005. ieeexplore.ieee.org … and Applications, 2005. AINA 2005. 19th …. 10 cites.
  325. Information Security and Privacy, Proceedings of 12th Australasian Conference, ACISP 2007“. J Pieprzyk, H Ghodosi, E Dawson. 2007. Springer . 10 cites.
  326. Realizing fully secure unrestricted ID-based ring signature in the standard model based on HIBE“. MH Au, JK Liu, W Susilo, J Zhou. 2013. ieeexplore.ieee.org IEEE Transactions on …. 10 cites.
  327. Security Issues in Vehicular Ad Hoc Networks“. P Caballero-Gil. 2011. intechopen.com Mobile ad-hoc networks: applications. 10 cites.
  328. Towards practical privacy-preserving digital rights management for cloud computing“. N Joshi, R Petrlic. 2013. ieeexplore.ieee.org Consumer Communications and …. 10 cites.
  329. W-shaped occultation signatures: Inference of entwined particle orbits in charged planetary ringlets“. VR Eshleman, JV Breakwell, GL Tyler, EA Marouf. 1983. Elsevier Icarus. 10 cites.
  330. Ad-hoc-group signatures from hijacked keypairs“. B Adida, S Hohenberger…. 2005. people.csail.mit.edu in DIMACS Workshop on …. 9 cites.
  331. Anonymous communication networks: Protecting privacy on the web“. K Peng. 2014. books.google.com . 9 cites.
  332. Attribute-based ring signatures (2008)“. J Li, K Kim. 2008. EPRINT http://eprint. iacr. org/2008/394. 9 cites.
  333. Contribution to privacy-preserving cryptographic techniques“. MHA Au. 2009. ro.uow.edu.au . 9 cites.
  334. Crypto-book: an architecture for privacy preserving online identities“. J Maheswaran, DI Wolinsky, B Ford. 2013. dl.acm.org … of the Twelfth ACM Workshop on …. 9 cites.
  335. Expressive subgroup signatures“. X Boyen, C Delerablée. 2008. Springer Security and Cryptography for Networks. 9 cites.
  336. Foundations of fully dynamic group signatures“. J Bootle, A Cerulli, P Chaidos, E Ghadafi…. 2016. Springer … Conference on Applied …. 9 cites.
  337. Generic Constructions for Strong Designated Verifier Signature.“. D Feng, J Xu, WD Chen. 2011. pdfs.semanticscholar.org JIPS. 9 cites.
  338. Highly efficient id-based ring signature from pairings“. HY Chien. 2008. ieeexplore.ieee.org Asia-Pacific Services Computing Conference, 2008 …. 9 cites.
  339. ID-based deniable ring authentication with constant-size signature“. L Wang, G Zhang, C Ma. 2008. Springer Frontiers of Computer Science in China. 9 cites.
  340. Identity-committable signatures and their extension to group-oriented ring signatures“. CK Chu, WG Tzeng. 2007. Springer Information Security and Privacy. 9 cites.
  341. On privacy-preserving ways to porting the austrian eID system to the public cloud“. B Zwattendorfer, D Slamanig. 2013. Springer IFIP International Information Security …. 9 cites.
  342. On tamper-resistance from a theoretical viewpoint“. P Mateus, S Vaudenay. 2009. Springer … Hardware and Embedded Systems-CHES 2009. 9 cites.
  343. Privacy in wireless sensor networks using ring signature“. A Debnath, P Singaravelu, S Verma. 2014. Elsevier Journal of King Saud University …. 9 cites.
  344. Rogue-key attacks on the multi-designated verifiers signature scheme“. KA Shim. 2008. Elsevier Information Processing Letters. 9 cites.
  345. Using SEND signature algorithm agility and multiple-key CGA to secure proxy neighbor discovery and anycast addressing“. T Cheneau, M Laurent. 2011. ieeexplore.ieee.org Network and Information Systems …. 9 cites.
  346. 一种签名长度固定的基于身份的环签名方案“. 王玲玲, 张国印, 马春光. 2007. jeit.ie.ac.cn 电子与信息学报. 9 cites.
  347. 两种无证书的分布环签名方案“. 桑永宣, 曾吉文. 2008. 电子学报. 9 cites.
  348. (Convertible) undeniable signatures without random oracles“. TH Yuen, MH Au, JK Liu, W Susilo. 2007. Springer International Conference on …. 8 cites.
  349. A new receipt-free voting scheme based on linkable ring signature for designated verifiers“. G Chen, C Wu, W Han, X Chen…. 2008. ieeexplore.ieee.org … Software and Systems …. 8 cites.
  350. A provably secure threshold ring signature scheme in certificateless cryptography“. H Wang, S Han. 2010. ieeexplore.ieee.org Information Science and Management …. 8 cites.
  351. A restricted multi-show credential system and its application on e-voting“. JK Liu, DS Wong. 2005. Springer ISPEC. 8 cites.
  352. A ring signature scheme based on the Nyberg-Rueppel signature scheme“. C Gao, Z Yao, L Li. 2003. Springer Applied Cryptography and Network Security. 8 cites.
  353. A ring-signature anonymous authentication method based on one-way accumulator“. Z Xu, H Tian, DS Liu, J Lin. 2010. ieeexplore.ieee.org … Systems, Networks and …. 8 cites.
  354. AFS: privacy-preserving public auditing with data freshness in the cloud“. P Maheswari, B Sindhumathi. 0. academia.edu … of Computer Engineering (IOSRJCE) e-ISSN. 8 cites.
  355. An efficient attribute-based ring signature scheme“. W Wenqiang, C Shaozhen. 2009. ieeexplore.ieee.org Computer Science-Technology …. 8 cites.
  356. Analysis of bilinear pairing-based accumulator for identity escrowing“. C Tartary, S Zhou, D Lin, H Wang, J Pieprzyk. 2008. IET IET Information Security. 8 cites.
  357. Analysis of revocable-iff-linked ring signature scheme“. IR Jeong, JO Kwon, DH Lee. 2009. jstage.jst.go.jp IEICE transactions on fundamentals of …. 8 cites.
  358. Anonymous authentication protocols for vehicular ad hoc networks: an overview“. H Xiong, Z Guan, J Hu, Z Chen. 2012. intechopen.com Applied Cryptography and …. 8 cites.
  359. Bathymetric and oceanographic applications of Kalman filtering techniques“. R Brammer, R Pass, J White. 1983. ieeexplore.ieee.org IEEE transactions on automatic …. 8 cites.
  360. Blind signature and ring signature schemes: Rehabilitation and attack“. SSM Chow. 2009. Elsevier Computer Standards & Interfaces. 8 cites.
  361. Efficient authentication and key agreement protocol with anonymity for delay tolerant networks“. Y Ding, X Zhou, Z Cheng, W Zeng. 2013. Springer Wireless personal communications. 8 cites.
  362. Enhancing the trust and perceived security in e-cognocracy“. J Piles, J Salazar, J Ruíz, J Moreno-Jiménez. 2007. Springer E-Voting and Identity. 8 cites.
  363. Frequency domain image analysis for detecting stress cracks in corn kernels“. YJ Han, Y Feng, CL Weller. 1996. elibrary.asabe.org Applied Engineering in Agriculture. 8 cites.
  364. Mesoscale variability between New York and Bermuda from repeated XBT sections and satellite altimetry“. RE Cheney, BC Douglas, E Khedouri…. 1985. journals.ametsoc.org Journal of physical …. 8 cites.
  365. Mitigating phishing with ID-based online/offline authentication“. Q Ren, Y Mu, W Susilo. 2008. dl.acm.org … of the sixth Australasian conference on …. 8 cites.
  366. Partial Signatures and their Applications.“. M Bellare, S Duan. 2009. ai2-s2-pdfs.s3.amazonaws.com IACR Cryptology ePrint Archive. 8 cites.
  367. PBC library manual 0.5. 11“. B Lynn. 2006. crypto.stanford.edu . 8 cites.
  368. Security analysis of an ultra‐lightweight RFID authentication protocol—SLMAP“. I Erguler, C Unsal, E Anarim…. 2012. Wiley Online Library Security and …. 8 cites.
  369. Security approaches in e-cognocracy“. JL Salazar, JJ Piles, J Ruiz-Mas…. 2010. Elsevier Computer Standards & …. 8 cites.
  370. Security Flaw of an ECC-based Signcryption Scheme with Anonymity.“. H Xiong, J Hu, Z Chen. 2013. ijns.femto.com.tw IJ Network Security. 8 cites.
  371. Short accountable ring signatures based on DDH“. J Bootle, A Cerulli, P Chaidos, E Ghadafi…. 2015. Springer … on Research in …. 8 cites.
  372. Signatures on a ring“. T Kanzaki. 1992. ousar.lib.okayama-u.ac.jp Mathematical Journal of Okayama University. 8 cites.
  373. Strong designated verifier ID-based ring signature scheme“. W Lei, L Daxing. 2008. ieeexplore.ieee.org … Science and Engineering, 2008. ISISE’08 …. 8 cites.
  374. Strong designated verifier ring signature scheme“. JS Lee, J Chang. 2007. Springer Innovations and Advanced Techniques in Computer …. 8 cites.
  375. Threshold ring signature scheme based on the curve“. H Kuwakadot, H Tanakat. 2003. ipsj.ixsq.nii.ac.jp IPSJ Journal. 8 cites.
  376. Two new identity-based threshold ring signature schemes“. L Deng, J Zeng. 2014. Elsevier Theoretical Computer Science. 8 cites.
  377. A Framework for Unique Ring Signatures.“. MK Franklin, H Zhang. 2012. ai2-s2-pdfs.s3.amazonaws.com IACR Cryptology …. 7 cites.
  378. Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting.“. CA Melchor, S Bettaieb, X Boyen, L Fousse…. 2013. books.google.com …. 7 cites.
  379. An improved threshold ring signature scheme based on error correcting codes“. PL Cayrel, S El Yousfi Alaoui, G Hoffmann…. 2012. Springer Arithmetic of Finite …. 7 cites.
  380. AnonRep: Towards Tracking-Resistant Anonymous Reputation.“. E Zhai, DI Wolinsky, R Chen, E Syta, C Teng, B Ford. 2016. usenix.org NSDI. 7 cites.
  381. Attribute-based signatures for circuits from multilinear maps“. F Tang, H Li, B Liang. 2014. Springer International Conference on Information Security. 7 cites.
  382. Attribute-based signatures with user-controlled linkability“. A El Kaafarani, L Chen, E Ghadafi…. 2014. Springer … Conference on Cryptology …. 7 cites.
  383. Authenticating with attributes in online social networks“. D Cao, B Zhao, X Wang, J Su…. 2011. ieeexplore.ieee.org … Systems (NBiS), 2011 …. 7 cites.
  384. Computationally sound symbolic anonymity of a ring signature“. Y Kawamoto, H Sakurada…. 2008. researchgate.net … and Issues in the Theory of …. 7 cites.
  385. Efficient sanitizable signatures without random oracles“. RWF Lai, T Zhang, SSM Chow, D Schröder. 2016. Springer European Symposium on …. 7 cites.
  386. Fair exchange signature schemes“. J Liu, R Sun, W Ma, Y Li, X Wang. 2008. ieeexplore.ieee.org … Information Networking and …. 7 cites.
  387. Improved Threshold Ring Signature for Ad-Hoc Group“. J Xiao, G Zeng, J Liao, P Huang. 2006. ieeexplore.ieee.org … , Networking and Mobile …. 7 cites.
  388. Integrity and Privacy Sustenance of Shared Large Scale Images in the Cloud by Ring Signature“. R Annamalai, J Srikanth…. 2015. search.proquest.com International Journal of …. 7 cites.
  389. Introducing accountability to onion routing“. M Backes, J Clark, P Druschel, A Kate, M Simeonovski. 2013. Grande Region Security and …. 7 cites.
  390. New insight to preserve online survey accuracy and privacy in big data era“. JK Liu, MH Au, X Huang, W Susilo, J Zhou…. 2014. Springer European Symposium on …. 7 cites.
  391. Non-interactive conference key distribution and its applications“. R Safavi-Naini, S Jiang. 2008. dl.acm.org Proceedings of the 2008 ACM symposium on …. 7 cites.
  392. Optimistic Fair Exchange of Ring Signatures.“. L Qu, G Wang, Y Mu. 2011. Springer SecureComm. 7 cites.
  393. Restricted identification scheme and diffie-hellman linking problem“. M Kutyłowski, Ł Krzywiecki, P Kubiak, M Koza. 2011. Springer INTRUST. 7 cites.
  394. Ring signature scheme based on multivariate public key cryptosystems“. S Wang, R Ma, Y Zhang, X Wang. 2011. Elsevier Computers & Mathematics with …. 7 cites.
  395. SEFAP: An Email System for Anti-Phishing“. Q Ren, Y Mu, W Susilo. 2007. ieeexplore.ieee.org … Science, 2007. ICIS 2007. 6th IEEE …. 7 cites.
  396. Shared-key signature and its application to anonymous authentication in ad hoc group“. Q Wu, X Chen, C Wang, Y Wang. 2004. Springer ISC. 7 cites.
  397. Subliminal channels in the identity-based threshold ring signature“. CL Yang, CM Li, T Hwang. 2009. Taylor & Francis International Journal of Computer …. 7 cites.
  398. The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity.“. R Hayashi, K Tanaka. 2005. Springer Public Key Cryptography. 7 cites.
  399. UPnP and secure group communication technique for zero-configuration environment construction using incremental clustering“. PC Sethi. 2013. academia.edu International Journal of Engineering. 7 cites.
  400. A note on an identity-based ring signature scheme with signer verifiability“. JY Hwang. 2011. Elsevier Theoretical Computer Science. 6 cites.
  401. A provably secure proxy signature scheme from bilinear pairings“. A Wang, J Li, Z Wang. 2010. Springer Journal of Electronics (China). 6 cites.
  402. Advances in Cryptology-CRYPTO 2002: 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings“. M Yung. 2002. books.google.com . 6 cites.
  403. Anonymous context based role activation mechanism“. PD Chowdhury, B Christianson, J Malcolm. 2005. Springer International Workshop on …. 6 cites.
  404. Confessible threshold ring signatures“. YS Chen, CL Lei, YP Chiu…. 2006. ieeexplore.ieee.org Systems and Networks …. 6 cites.
  405. Cooperative influence of water binding to peptides by N H··· OH2 and C O··· HOH hydrogen bonds: Study by Ab Initio calculations“. CL Sun, CS Wang. 2012. Wiley Online Library International Journal of Quantum …. 6 cites.
  406. Distributed ring signatures from general dual access structures“. J Herranz, G Sáez. 2006. Springer Designs, Codes and Cryptography. 6 cites.
  407. Electronic health records: An enhanced security paradigm to preserve patient’s privacy“. D Slamanig, C Stingl. 2009. Springer International Joint Conference on Biomedical …. 6 cites.
  408. Far-infrared signatures of hydrogen bonding in phenol derivatives“. DJ Bakker, A Peters, V Yatsyna…. 2016. ACS Publications The journal of …. 6 cites.
  409. ID-based Proxy Ring Signature Scheme [J]“. JZ Zhang, RH Xue, LH Peng. 2011. en.cnki.com.cn Computer Engineering. 6 cites.
  410. Inter device personal information transfer“. AM Olson. 2006. Google Patents US Patent 7,127,242. 6 cites.
  411. Invariants for the FoCaL language“. R Rioboo. 2009. Springer Annals of Mathematics and Artificial Intelligence. 6 cites.
  412. Noninteractive, anonymously authenticated, and traceable message transmission for VANETs“. MH Ibrahim. 2010. hindawi.com International Journal of Vehicular Technology. 6 cites.
  413. Prototyping a lightweight trust architecture to fight phishing“. D Chau. 2005. pdfs.semanticscholar.org … And Artificial Intelligence Laboratory, Tech. Rep …. 6 cites.
  414. Response of anatomical features of broadlesf tree root in karst area to soil erosion“. L Mei, WK Ke. 2011. Elsevier Procedia Engineering. 6 cites.
  415. Ring proxy signatures“. B Wei, F Zhang, X Chen. 2008. Springer Journal of Electronics (China). 6 cites.
  416. Saving On-Line Privacy.“. J Camenisch, G Neven. 2009. Springer PrimeLife. 6 cites.
  417. Security analysis and enhancement for three‐party password‐based authenticated key exchange protocol“. J Zhao, D Gu, L Zhang. 2012. Wiley Online Library Security and Communication …. 6 cites.
  418. The Solution of Safety of Electronic Cash in E-Commerce under Cloud Computing Environment“. SJ Gong, LP Zeng. 2014. Trans Tech Publ Advanced Materials Research. 6 cites.
  419. Threshold ring signatures and applications to ad-hoc groups. full version“. E Bresson, J Stern, M Szydlo. 2002. cs.ucdavis.edu . 6 cites.
  420. 一种基于身份的代理环签名方案“. 张建中, 薛荣红, 彭丽慧. 2011. 计算机工程. 6 cites.
  421. 无证书盲签名方案“. 苏万力, 张跃宇, 张晓红, 王育民. 2009. tec.icbuy.com 电子科技大学学报. 6 cites.
  422. 无证书盲签名方案“. 苏万力, 张跃宇, 张晓红, 王育民. 2009. tec.icbuy.com 电子科技大学学报. 6 cites.
  423. A collaboratively hidden location privacy scheme for VANETs“. Y Mei, G Jiang, W Zhang, Y Cui. 2014. journals.sagepub.com International Journal of …. 5 cites.
  424. A general framework for group authentication and key exchange protocols“. H Yang, L Jiao, VA Oleshchuk. 2014. Springer Foundations and Practice of Security. 5 cites.
  425. A multi-purpose group signature for vehicular network security“. MSI Mamun, A Miyaji, H Takada. 2014. ieeexplore.ieee.org Network-Based Information …. 5 cites.
  426. A new multi-bank e-cash protocol with anonymity control“. L Wang. 2009. ieeexplore.ieee.org Information Assurance and Security, 2009. IAS’09 …. 5 cites.
  427. A new type of proxy ring signature scheme with revocable anonymity“. C Hu, D Li. 2007. ieeexplore.ieee.org … , and Parallel/Distributed Computing, 2007. SNPD …. 5 cites.
  428. A new yardstick for benzenoid polycyclic aromatic hydrocarbons“. M Pompe, M Randic, AT Balaban. 2008. ACS Publications The Journal of Physical …. 5 cites.
  429. A novel anonymous authenticated key agreement protocol for vehicular ad hoc networks“. C Büttner, SA Huss. 2015. ieeexplore.ieee.org Information Systems Security and Privacy …. 5 cites.
  430. A novel fuzzy identity-based signature with dynamic threshold“. W Chen, L Zhu, X Cao, Y Geng. 2009. ieeexplore.ieee.org Network and System Security …. 5 cites.
  431. A proxy ring signature scheme with revocable anonymity from bilinear pairings“. H Wang. 2009. ieeexplore.ieee.org … Information Networking and Security, 2009. MINES’ …. 5 cites.
  432. A Strong RSA-based and Certificateless-based Signature Scheme.“. CC Chang, CY Sun, SC Chang. 2016. ijns.jalaxy.com.tw IJ Network Security. 5 cites.
  433. A survey of noninteractive zero knowledge proof system and its applications“. H Wu, F Wang. 2014. hindawi.com The Scientific World Journal. 5 cites.
  434. A survey of ring signature“. W Lingling, Z Guoyin…. 2008. academic.hep.com.cn Frontiers of Electrical and …. 5 cites.
  435. An efficient strong ID-based signature scheme with unforgeability“. J Zhang, X Liu. 2010. ieeexplore.ieee.org Frontier of Computer Science and Technology …. 5 cites.
  436. Anonymous identification and designated-verifiers signatures from insecure batch verification“. SSM Chow, DS Wong. 2007. Springer EuroPKI. 5 cites.
  437. Attribute-based signature scheme with constant size signature“. F Zeng, C Xu, Q Li, X Zhang. 2012. pdfs.semanticscholar.org Journal of Computational …. 5 cites.
  438. Borromean ring signatures“. G Maxwell, A Poelstra. 2015. pdfs.semanticscholar.org . 5 cites.
  439. Continuous earlywood vessels chronologies in floodplain ring-porous species can improve dendrohydrological reconstructions of spring high flows and flood levels“. S Kames, JC Tardif, Y Bergeron. 2016. Elsevier Journal of Hydrology. 5 cites.
  440. Democratic Group Signatures with Threshold Traceability.“. D Zheng, X Li, C Ma, K Chen, J Li. 2008. eprint.iacr.org IACR Cryptology ePrint Archive. 5 cites.
  441. Di-electron production in C+ C and p+ p collisions with HADES“. T Eberl. 2007. Springer The European Physical Journal C-Particles and Fields. 5 cites.
  442. Efficient verifiable ring encryption for ad hoc groups“. JK Liu, PP Tsang, DS Wong. 2005. Springer European Workshop on Security in Ad-hoc …. 5 cites.
  443. Energetic particle signatures of satellites and rings in Neptune’s magnetosphere“. RS Selesnick, EC Stone. 1992. Elsevier Advances in Space Research. 5 cites.
  444. Generic constructions for universal designated-verifier signatures and identity-based signatures from standard signatures“. SF Shahandashti, R Safavi-Naini. 2009. IET IET Information security. 5 cites.
  445. Identity-based threshold ring signature without pairings“. X Hu, Q ZhiGuang, L FaGen. 2008. ieeexplore.ieee.org Communications, Circuits and …. 5 cites.
  446. Improved lattice-based threshold ring signature scheme“. S Bettaieb, J Schrek. 2013. Springer International Workshop on Post-Quantum …. 5 cites.
  447. Information Security Practice and Experience“. L Zhang, Q Wu, B Qin, H Deng, J Liu…. 2014. researchgate.net … Asymmetric Group Key …. 5 cites.
  448. Lattice-based multi-party concurrent signatures scheme“. S Wang, L Liu, J Chen, J Sun, X Zhang…. 2013. ieeexplore.ieee.org … (INCoS), 2013 5th …. 5 cites.
  449. Lightweight anonymous authentication for ad hoc group: A ring signature approach“. X Yang, W Wu, JK Liu, X Chen. 2015. Springer International Conference on Provable …. 5 cites.
  450. Linkable ring signatures from linear feedback shift register“. D Zheng, X Li, K Chen, J Li. 2007. Springer Emerging Directions in Embedded and …. 5 cites.
  451. Multi-Party Concurrent Signature Scheme Based on Designated Verifiers.“. J Xushuai, Z Zhou, W Qin, Q Jiang, N Zhou. 2013. pdfs.semanticscholar.org JCP. 5 cites.
  452. New definitions and designs for anonymous signatures“. M Bellare, S Duan. 2009. pdfs.semanticscholar.org Cryptology ePrint Archive, Report …. 5 cites.
  453. Perfect Concurrent Signature Protocol for Symmetric Participant“. J Han, X Qiuliang, Z Bo. 2008. ieeexplore.ieee.org … Intelligence and Security, 2008. CIS’08 …. 5 cites.
  454. Privacy-Preserving Digital Rights Management based on Attribute-based Encryption“. R Petrlic, C Sorge. 2014. ieeexplore.ieee.org … , Mobility and Security (NTMS), 2014 6th …. 5 cites.
  455. Progress in Cryptology-INDOCRYPT 2004“. A Canteaut, K Viswanathan. 2005. Springer . 5 cites.
  456. Proof-carrying proxy certificates“. W Bagga, S Crosta, R Molva. 2006. Springer SCN. 5 cites.
  457. Protection of mobile agent data collection by using ring signature“. HC Lin, SM Yen, HS Chen. 2004. ieeexplore.ieee.org Networking, Sensing and Control …. 5 cites.
  458. Reaction mechanism of HSH and CH3SH with NH2CH2COCH2X (X= F and Cl) molecules“. S Vijayakumar, P Kolandaivel. 2008. Wiley Online Library International Journal of …. 5 cites.
  459. Related randomness attacks for public key cryptosystems“. TH Yuen, C Zhang, SSM Chow, SM Yiu. 2015. dl.acm.org Proceedings of the 10th ACM …. 5 cites.
  460. Ring confidential transactions“. S Noether, A Mackenzie. 2016. ledgerjournal.org Ledger. 5 cites.
  461. Ring SIgnature Confidential Transactions for Monero.“. S Noether. 2015. eprint.iacr.org IACR Cryptology ePrint Archive. 5 cites.
  462. Round-Optimal Deniable Ring Authentication in the Presence of Big Brother.“. R Dowsley, G Hanaoka, H Imai, ACA Nascimento. 2010. Springer WISA. 5 cites.
  463. Securization of policy making social computing. An application to e-cognocracy“. JM Moreno-Jiménez, JJ Piles, J Ruiz, JL Salazar…. 2011. Elsevier Computers in Human …. 5 cites.
  464. Strong designated verifier proof signature without hash functions and the same scheme for an ad-hoc group ring“. JS Lee, JH Chang. 2006. paper.ijcsns.org International Journal of Computer Science and …. 5 cites.
  465. Sub-linear blind ring signatures without random oracles“. EM Ghadafi. 2013. Springer IMA International Conference on Cryptography and …. 5 cites.
  466. The Fiat-Shamir Transform for Group and Ring Signature Schemes.“. MF Lee, NP Smart, B Warinschi. 2010. Springer SCN. 5 cites.
  467. The ring authenticated encryption scheme–How to provide a clue wisely“. J Lv, K Ren, X Chen, K Kim. 2009. Elsevier Information Sciences. 5 cites.
  468. Theoretical computer science: essays in memory of Shimon Even“. O Goldreich, AL Rosenberg, AL Selman. 2006. Springer . 5 cites.
  469. Two extensions of the ring signature scheme of Rivest–Shamir–Taumann“. Q Dong, X Li, Y Liu. 2012. Elsevier Information Sciences. 5 cites.
  470. A new ring signature scheme from NTRU lattice“. C Wang, H Wang. 2012. ieeexplore.ieee.org Computational and Information Sciences …. 4 cites.
  471. A new way to generate a ring: Universal ring signature“. R Tso. 2013. Elsevier Computers & Mathematics with Applications. 4 cites.
  472. A Proxy Ring Signature Scheme with Revocable Anonymity Based on Bilinear Pairings“. HQ Wang. 2010. airitilibrary.com 網際網路技術學刊. 4 cites.
  473. A survey on privacy preserving techniques for secure cloud storage“. S Bhagyashri, YB Gurave. 2014. academia.edu … Journal of Computer Science and Mobile …. 4 cites.
  474. An efficient ID-based proxy ring signature scheme“. W Lei, L Daxing. 2009. ieeexplore.ieee.org … and Mobile Computing, 2009. CMC’09. WRI …. 4 cites.
  475. An enhanced-security fair e-payment protocol“. W Fan, H Shu, E Fife, Q Yan. 2009. ieeexplore.ieee.org Computer Science and …. 4 cites.
  476. An Identity-Based Ring Signature Scheme with Constant-Size Signature [J]“. WLZ Guo-yin, M Chun-guang. 2007. en.cnki.com.cn Journal of Electronics & Information …. 4 cites.
  477. Anonymous proxy signature with restricted traceability“. J Wei, G Yang, Y Mu. 2014. ieeexplore.ieee.org Trust, Security and Privacy in Computing …. 4 cites.
  478. Anonymous signcryption in ring signature scheme over elliptic curve cryptosystem“. YF Chung, ZY Wu, FP Lai, TS Chen. 2006. atlantis-press.com Proceedings of the 9th …. 4 cites.
  479. Book Review“. L Massa. 2011. Wiley Online Library . 4 cites.
  480. Certificate-based perfect concurrent signatures“. Z Huang, J Chen. 2010. ieeexplore.ieee.org Multimedia Information Networking and …. 4 cites.
  481. Certificate-free ad hoc anonymous authentication“. Z Qin, H Xiong, G Zhu, Z Chen. 2014. Elsevier Information Sciences. 4 cites.
  482. Certified synthesis of efficient batch verifiers“. JA Akinyele, G Barthe, B Grégoire…. 2014. ieeexplore.ieee.org … (CSF), 2014 IEEE …. 4 cites.
  483. Controllable ring signatures and its application to E-prosecution“. W Gao, G Wang, X Wang, D Xie. 2013. ro.uow.edu.au . 4 cites.
  484. Cryptanalysis of Attribute-based Ring Signcryption Scheme.“. H Xiong, J Geng, Z Qin, G Zhu. 2015. ijns.jalaxy.com.tw IJ Network Security. 4 cites.
  485. Data and code integrity in Grid environments“. R Akimana, O Markowitch. 2006. wseas.us WSEAS International Conference on …. 4 cites.
  486. Deniable key exchanges for secure messaging“. N Unger, I Goldberg. 2015. dl.acm.org Proceedings of the 22nd ACM SIGSAC …. 4 cites.
  487. Efficient provable secure ID-based anonymous signcryption scheme“. J Zhang, H Chen. 2009. ieeexplore.ieee.org … and Systems, 2009. PACCS’09. Pacific …. 4 cites.
  488. ID Based Signature Schemes for Electronic Voting“. T Menon, R Sindhuja. 2009. ieeexplore.ieee.org Computer and Electrical Engineering …. 4 cites.
  489. Identity-based strong key-insulated ring signature scheme in the standard model“. H Wang, Y Zhang. 2011. ieeexplore.ieee.org Mobile Ad-hoc and Sensor Networks (MSN) …. 4 cites.
  490. Intro to bilinear maps“. J Bethencourt. 2006. uniroma2.it … Sciences Department, Carnegie Mellon University. http …. 4 cites.
  491. Investigating anonymity in group based anonymous authentication“. D Slamanig, C Stingl. 2008. Springer IFIP Summer School on the Future of Identity in the …. 4 cites.
  492. Key-Homomorphic Signatures and Applications to Multiparty Signatures.“. D Derler, D Slamanig. 2016. pdfs.semanticscholar.org IACR Cryptology ePrint Archive. 4 cites.
  493. Method, apparatus, system, and program for creating ring signature“. Y Suga. 2004. Google Patents US Patent App. 10/761,697. 4 cites.
  494. Multi-key leakage-resilient threshold cryptography“. C Zhang, TH Yuen, H Xiong, SSM Chow…. 2013. dl.acm.org Proceedings of the 8th …. 4 cites.
  495. Non-interactive confirmer signatures“. SSM Chow, K Haralambiev. 2011. Springer Cryptographers’ Track at the RSA …. 4 cites.
  496. On the definitions of anonymity for ring signatures“. M Ohkubo, M Abe. 2008. jstage.jst.go.jp IEICE transactions on fundamentals of …. 4 cites.
  497. On the difficult tradeoff between security and privacy: Challenges for the management of digital identities“. D Arroyo, J Diaz, V Gayoso. 2015. Springer International Joint Conference. 4 cites.
  498. On the transferability of private signatures“. J Herranz. 2009. Elsevier Information Sciences. 4 cites.
  499. Policy-Controlled Signatures.“. P Thorncharoensri, W Susilo, Y Mu. 2009. Springer ICICS. 4 cites.
  500. Practical Traceable Anonymous Identification.“. D Slamanig, P Schartner, C Stingl. 2009. pdfs.semanticscholar.org SECRYPT. 4 cites.
  501. Privacy-preserving public auditing for secure cloud storage“. S Bhagyashri, YB Gurav. 2014. pdfs.semanticscholar.org IOSR Journal of Computer …. 4 cites.
  502. Real-world evaluation of an anonymous authenticated key agreement protocol for vehicular ad-hoc networks“. C Büttner, F Bartels, SA Huss. 2015. ieeexplore.ieee.org Wireless and Mobile Computing …. 4 cites.
  503. RE-NOTE: An E-voting scheme based on ring signature and clash attack protection“. H Pan, E Hou, N Ansari. 2013. ieeexplore.ieee.org Global communications conference …. 4 cites.
  504. Ring signature based on ElGamal signature“. J Ren, L Harn. 2006. Springer Lecture notes in computer science. 4 cites.
  505. Ring signatures: Universally composable definitions and constructions“. K Yoneyama, K Ohta. 2007. jstage.jst.go.jp Information and Media Technologies. 4 cites.
  506. Scalable deniable group key establishment“. K Neupane, R Steinwandt, AS Corona. 2012. Springer International Symposium on …. 4 cites.
  507. Secure and anonymous mobile ad-hoc networks“. Y Mu, F Zhang, W Susilo. 2005. ieeexplore.ieee.org Networks, 2005. Jointly held with the …. 4 cites.
  508. Signature schemes using bilinear mappings“. CB Gentry. 2012. Google Patents US Patent 8,180,049. 4 cites.
  509. Step-out group signatures“. M Klonowski, Ł Krzywiecki, M Kutyłowski, A Lauks. 2009. Springer Computing. 4 cites.
  510. Study of in vitro mitral valve filling flow.“. T Drost, T Zimmer, HB Kim, R Shandas…. 2004. europepmc.org Biomedical sciences …. 4 cites.
  511. Threshold-oriented optimistic fair exchange“. Y Wang, MH Au, JK Liu, TH Yuen, W Susilo. 2013. Springer International Conference on …. 4 cites.
  512. Unconditionally secure ring authentication“. R Safavi-Naini, S Wang, Y Desmedt. 2007. dl.acm.org … of the 2nd ACM symposium on …. 4 cites.
  513. 一种可追踪签名者的环签密方案“. 孙庆英, 吴克力, 徐会艳. 2011. 计算机工程. 4 cites.
  514. 基于身份的无可信中心门限环签名方案“. 李虓, 何明星, 罗大文. 2008. 计算机工程. 4 cites.
  515. A lattice-based designated verifier signature for cloud computing“. Y Zhang, Q Liu, C Tang, H Tian. 2015. inderscienceonline.com International Journal of …. 3 cites.
  516. A mobile ad hoc network public key encryption algorithm based on hash-chain“. W Feng, S Qing-wei, C Ke. 2011. Elsevier Procedia Engineering. 3 cites.
  517. A More Efficient Instantiation of Witness-Indistinguishable Signature.“. JK Liu, DS Wong. 2007. ijns.jalaxy.com.tw IJ Network Security. 3 cites.
  518. A new improved ID-based proxy ring signature scheme from bilinear pairings“. L Weimin, Y Zongkai, C Wenqing. 2006. 万方数据资源系统 Journal of Harbin Institute of …. 3 cites.
  519. A new verifiable ring signature scheme based on nyberg-rueppel scheme“. Z Changlun, L Yun, H Dequan. 2006. ieeexplore.ieee.org Signal Processing, 2006 8th …. 3 cites.
  520. A novel id-based threshold ring signature scheme competent for anonymity and anti-forgery“. YF Chung, ZY Wu, TS Chen. 2006. Springer International Conference on Computational …. 3 cites.
  521. A novel ring signature scheme with Multi-designated verifiers“. J Zhang, J Xie. 2008. ieeexplore.ieee.org … Intelligent Systems, 2008 IEEE Conference on. 3 cites.
  522. A privacy problem on Hu–Huang’s proxy key generation protocol“. H Park, S Lim, I Yie. 2009. Elsevier Computer Standards & Interfaces. 3 cites.
  523. A Provably Secure Certificate Based Ring Signature Without Pairing.“. Z Qin, H Xiong, F Li. 2014. pdfs.semanticscholar.org IJ Network Security. 3 cites.
  524. A provably secure parallel certificatelesss ring signcryption scheme“. L Zhu, F Zhang, S Miao. 2010. ieeexplore.ieee.org Multimedia Information Networking …. 3 cites.
  525. A Review On Multi Level Identity Based Cryptography For Secure Digital Signature Authentication“. P Sumalatha, B Sathyanarayana. 2014. ijcea.com International Journal of Computer …. 3 cites.
  526. A Ring Signature Scheme with Strong Designated Verifiers to Provide Signer Anonymity“. SJ Hwang, KL Cheng. 0. Workshop on Cryptography and Information Security …. 3 cites.
  527. A secure and practical approach for providing anonymity protection for trusted platforms“. K Dietrich, J Winter. 2010. Springer Information and Communications Security. 3 cites.
  528. A short identity-based proxy ring signature scheme from RSA“. MR Asaar, M Salmasizadeh, W Susilo. 2015. Elsevier Computer Standards & Interfaces. 3 cites.
  529. A strong designated verifier signature scheme tightly related to the LRSW assumption“. KA Shim. 2013. Taylor & Francis International Journal of Computer Mathematics. 3 cites.
  530. A study on efficient group-oriented signature schemes for realistic application environment“. YF Chung, TL Chen, TS Chen…. 2012. pdfs.semanticscholar.org Int. J. Innovative …. 3 cites.
  531. A survey of research on electronic auction“. X CHEN, Y WANG. 2002. en.cnki.com.cn Journal of China Institute of. 3 cites.
  532. A taxonomy of ring signature schemes: Theory and applications“. H Xiong, Z Qin, F Li. 2013. Taylor & Francis IETE Journal of Research. 3 cites.
  533. A viewable e-voting scheme for environments with conflict of interest“. H Li, Y Sui, W Peng, X Zou, F Li. 2013. ieeexplore.ieee.org Communications and Network …. 3 cites.
  534. Access control based on group signatures in cloud service“. H Zheng, Z Zhao, X Zhang. 2012. ieeexplore.ieee.org Computer Science and Automation …. 3 cites.
  535. Affiliation-hiding authenticated asymmetric group key agreement“. C Xu, Z Li, Y Mu, H Guo, T Guo. 2012. academic.oup.com The Computer Journal. 3 cites.
  536. An efficient blind ring signature scheme without pairings“. J Zhang, H Chen, X Liu, C Liu. 2010. Springer International Conference on Web-Age …. 3 cites.
  537. An efficient ring signature scheme from pairings“. KA Shim. 2015. Elsevier Information Sciences. 3 cites.
  538. An Exploration of Group and Ring Signatures“. S Meiklejohn. 2011. academia.edu UCSD Research Exam. 3 cites.
  539. Ancient oak climate proxies from the agricultural heartland“. RP Guyette, MC Stambaugh…. 2004. Wiley Online Library Eos, Transactions …. 3 cites.
  540. Anonymous authentication from public-key encryption revisited“. D Slamanig. 2011. Springer Communications and Multimedia Security. 3 cites.
  541. Anonymous communications in overlay networks“. J Ren, T Li, Y Li. 2008. ieeexplore.ieee.org Military Communications Conference, 2008 …. 3 cites.
  542. Anonymous proof of membership with ring signature“. CC Chang, T Hwang. 2005. ieeexplore.ieee.org Electro Information Technology, 2005 …. 3 cites.
  543. Assessing cryptographic signature schemes from a legal perspective“. DTF Chan, LCK Hui, SM Yiu. 2014. ieeexplore.ieee.org Privacy, Security and Trust (PST) …. 3 cites.
  544. Attribute Based Signature Scheme For Attribute Based Encrypted Data In Cloud“. R Vaishnav. 2012. pdfs.semanticscholar.org International Journal of Engineering …. 3 cites.
  545. Attribute-based ring signatures. ePrint, IACR“. J Li, K Kim. 0. . 3 cites.
  546. Borromean ring signatures (2015)“. G Maxwell, A Poelstra. 2015. . 3 cites.
  547. Breaking a certificateless strong designated verifier signature scheme“. J Zhang, J Xie. 2011. ieeexplore.ieee.org Consumer Electronics, Communications and …. 3 cites.
  548. Bringing New Elements to Bitcoin with Sidechains“. G Maxwell. 2015. people.xiph.org SF Bitcoin Devs Meetup. 3 cites.
  549. Certificateless ring signature based on RSA problem and DL problem“. L Deng. 2015. rairo-ita.org RAIRO-Theoretical Informatics and Applications. 3 cites.
  550. Compact Confidential Transactions“. D Lukianov. 2015. voxelsoft.com . 3 cites.
  551. Cryptographic mechanisms for privacy“. J Camenisch, M Dubovitskaya, M Kohlweiss…. 2011. Springer Privacy and Identity …. 3 cites.
  552. Democratic group signatures with collective traceability“. X Li, D Zheng, K Chen, J Li. 2009. Elsevier Computers & Electrical Engineering. 3 cites.
  553. Democratic group signatures with threshold traceability“. X Li, H Qian, J Li. 2009. Springer Journal of Shanghai Jiaotong University (Science). 3 cites.
  554. Design and Analysis of” Flexible” k-out-of-n Signatures.“. R Tso, X Yi, T Ito, T Okamoto, E Okamoto. 2010. Springer ATC. 3 cites.
  555. Design strategies for a privacy-friendly Austrian eID system in the public cloud“. B Zwattendorfer, D Slamanig. 2015. Elsevier Computers & Security. 3 cites.
  556. Efficient spatial privacy preserving scheme for sensor network“. A Debnath, P Singaravelu, S Verma. 2013. degruyter.com Open Engineering. 3 cites.
  557. Flexible multi-authority attribute-based signature schemes for expressive policy“. D Cao, B Zhao, X Wang, J Su. 2012. content.iospress.com Mobile Information Systems. 3 cites.
  558. Fully deniable message authentication protocols preserving confidentiality“. L Harn, CY Lee, C Lin, CC Chang. 2011. academic.oup.com The Computer Journal. 3 cites.
  559. IAA: incentive-based anonymous authentication scheme in smart grids“. Z Sui, A Alyousef, H de Meer. 2015. Springer International Conference on Internet …. 3 cites.
  560. ID-based ring proxy signatures“. B Wei, F Zhang, X Chen. 2007. ieeexplore.ieee.org Information Theory, 2007. ISIT 2007 …. 3 cites.
  561. Identity-based quotable ring signature“. K Wang, Y Mu, W Susilo. 2015. Elsevier Information Sciences. 3 cites.
  562. Identity-based ring signature from lattice basis delegation“. J Wang. 2008. pdfs.semanticscholar.org Beijing: Tsinghua University. 3 cites.
  563. IPv6 网络中的路由蠕虫传播模型倡“. 徐延贵, 钱焕延, 李华峰. 2009. arocmag.com 计算机应用研究. 3 cites.
  564. Lattice-based ring signature scheme under the random oracle model“. S Wang. 2014. arxiv.org arXiv preprint arXiv:1405.3177. 3 cites.
  565. Method for representing objects with concentric ring signature descriptors for detecting 3D objects in range images“. F Porikli, H Nguyen. 2012. Google Patents US Patent 8,274,508. 3 cites.
  566. Multi-party concurrent signatures based on short ring signatures“. L Wang. 2010. ieeexplore.ieee.org … , Networking and Information Security (WCNIS), 2010 …. 3 cites.
  567. Non-conventional Digital Signatures and Their Implementations—A Review“. D Arroyo, J Diaz, FB Rodriguez. 2015. Springer International Joint Conference. 3 cites.
  568. Non-interactive deniable ring signatures“. W Susilo, Y Mu. 2003. the 6th International Conference on Information …. 3 cites.
  569. On the use of key assignment schemes in authentication protocols“. J Alderman, J Crampton. 2013. Springer … Conference on Network and System Security. 3 cites.
  570. Ownership-hidden group-oriented proofs of storage from pre-homomorphic signatures“. Y Wang, Q Wu, B Qin, X Chen, X Huang…. 2016. Springer Peer-to-Peer Networking …. 3 cites.
  571. Preface“. H Rott, C Mätzler. 1989. Pergamon . 3 cites.
  572. Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies“. M Borge, E Kokoris-Kogias, P Jovanovic…. 2017. ieeexplore.ieee.org Security and Privacy …. 3 cites.
  573. Purpose-restricted anonymous mobile communications using anonymous signatures in online credential systems“. H Fathi, SH Shin, K Kobara, H Imai. 2010. Springer Wireless personal communications. 3 cites.
  574. Relinkable ring signature“. K Suzuki, F Hoshino, T Kobayashi. 2009. Springer International Conference on …. 3 cites.
  575. SA 3: Self-adaptive anonymous authentication for dynamic authentication policies“. Y Lian, X Huang, Y Mu. 2014. Elsevier Future Generation Computer Systems. 3 cites.
  576. SECURE AND EFFICIENT PRIVACY-PRESERVING PUBLIC AUDITING SCHEME FOR CLOUD STORAGE“. DGK Kamalam, B Neka…. 2015. pdfs.semanticscholar.org International Journal of …. 3 cites.
  577. Signature schemes using bilinear mappings“. CB Gentry. 2010. Google Patents US Patent 7,814,326. 3 cites.
  578. Smart Card Research and Advanced Applications VI: IFIP 18th World Computer Congress TC8/WG8. 8 & TC11/WG11. 2 Sixth International Conference on …“. JJ Quisquater, P Paradinas, Y Deswarte, AA El Kalam. 2006. books.google.com . 3 cites.
  579. Stretching groth-sahai: NIZK proofs of partial satisfiability“. C Ràfols. 2015. Springer Theory of Cryptography Conference. 3 cites.
  580. Sub-linear Blind Ring Signatures without Random Oracles“. G ESSAM. 2013. Proceedings of the 14th IMA International Conference …. 3 cites.
  581. Sub-linear size traceable ring signatures without random oracles“. E Fujisaki. 2012. search.ieice.org … on Fundamentals of Electronics, Communications and …. 3 cites.
  582. Tezos: A Self-Amending Crypto-Ledger Position Paper“. LM Goodman. 2014. tezos.com . 3 cites.
  583. The security and the credibility challenges in E-voting systems“. A Rana, I Zincir, S Basarici. 2015. books.google.com European Conference on Cyber …. 3 cites.
  584. Threshold anonymous credential system.“. K Fung, TK Chan, JK Liu, DS Wong. 2004. researchgate.net WSEAS Transactions on …. 3 cites.
  585. Towards self-organized location privacy in mobile networks“. J Freudiger, M Raya, JP Hubaux. 2008. infoscience.epfl.ch . 3 cites.
  586. Unique aggregate signatures with applications to distributed verifiable random functions“. V Kuchta, M Manulis. 2013. Springer … Conference on Cryptology and Network Security. 3 cites.
  587. Universal designated verifier signatures with threshold-signers“. P Thorncharoensri, W Susilo, Y Mu. 2009. Springer International Workshop on Security. 3 cites.
  588. Unlinkable content playbacks in a multiparty DRM system“. R Petrlic, S Sekula. 2013. Springer IFIP Annual Conference on Data and Applications …. 3 cites.
  589. A constant-size linkable ring signature scheme for e-cash protocol“. P Liu, C Hu. 2010. ieeexplore.ieee.org … Engineering and Technology (ICCET), 2010 2nd …. 2 cites.
  590. A New Construction of Time Capsule Signature.“. M Zhang, G Chen, J Li, L Wang…. 2006. pdfs.semanticscholar.org IACR Cryptology …. 2 cites.
  591. A new framework for conditionally anonymous ring signature“. S Zeng, S Jiang. 2013. academic.oup.com The Computer Journal. 2 cites.
  592. A new ID-based ring signature scheme with constant-size signature“. C Hu, P Liu. 2010. ieeexplore.ieee.org … Engineering and Technology (ICCET), 2010 2nd …. 2 cites.
  593. A new identity-based threshold ring signature scheme“. F Xu, X Lv. 2011. ieeexplore.ieee.org Systems, Man, and Cybernetics (SMC), 2011 IEEE …. 2 cites.
  594. A new multivariate-based ring signature scheme“. LL Wang. 2013. Trans Tech Publ Applied Mechanics and Materials. 2 cites.
  595. A note on chain reactions in traceability in cryptonote 2.0“. S Noether, A Mackenzie. 2014. bravenewcoin.com Technical report. 2 cites.
  596. A Novel Id-Based Threshold Ring Signature Scheme Competent for Anonymity and Anti-Forgery“. ZY Wu, FG Jeng, TS Chen. 2006. ieeexplore.ieee.org Computational Intelligence and …. 2 cites.
  597. A provably secure identity‐based proxy ring signature based on RSA“. MR Asaar, M Salmasizadeh…. 2015. Wiley Online Library Security and …. 2 cites.
  598. A ring signature scheme over braid groups“. Y Wei, G Xiong, W Bao, X Zhang. 2010. Springer Journal of Electronics (China). 2 cites.
  599. A Secure Publicly Verifiable Auction Scheme [J]“. C YE, M ZHANG, T WU, H DU. 2008. en.cnki.com.cn Microelectronics & Computer. 2 cites.
  600. A traceable optimistic fair exchange protocol“. R Ganjavi, MR Asaar…. 2014. ieeexplore.ieee.org Information Security and …. 2 cites.
  601. AATCT: Anonymously authenticated transmission on the cloud with traceability“. MH Ibrahim. 2015. researchgate.net … Journal of Advanced Computer Science & …. 2 cites.
  602. An automotive distributed mobile sensor data collection with machine learning based data fusion and analysis on a central backend system“. T Tiedemann, C Backe, T Vögele, P Conradi. 2016. Elsevier Procedia Technology. 2 cites.
  603. An efficient attribute-based signature scheme with claim-predicate mechanism“. C Wang, W Li. 2013. inderscienceonline.com International Journal of Grid and Utility …. 2 cites.
  604. An efficient t-times proxy ring signature scheme with revocable anonymity“. J Zhang, H Chen. 2011. ieeexplore.ieee.org … Software and Networks (ICCSN), 2011 IEEE …. 2 cites.
  605. An eVoting platform for QoE evaluation“. JL Tornos, JL Salazar, JJ Piles. 2013. ieeexplore.ieee.org … Network Management (IM …. 2 cites.
  606. An evoting system based on ring signatures“. JL Tornos, JL Salazar, JJ Piles, J Saldana…. 2014. macrothink.org Network Protocols …. 2 cites.
  607. An Improved Identity-Based Ring Signcryption Scheme“. L Deng, C Liu, X Wang. 2013. Taylor & Francis Information Security Journal: A Global …. 2 cites.
  608. AN IMPROVED PROTOCOL OF ELECTRICAL AUCTION WITH SEALED BIDS [J]“. CXZFW Yumin. 2002. en.cnki.com.cn Journal of Electronics and Information Technology. 2 cites.
  609. Anonymity and security in mobile Ad hoc networks“. J Bolla, V Vatsavayi, J Murthy. 2012. Springer Distributed Computing and Internet …. 2 cites.
  610. Another Efficient Identity-Based Ring Signature Scheme and Its Extension“. J Zhang, J Cheng. 2007. ieeexplore.ieee.org Data, Privacy, and E-Commerce, 2007 …. 2 cites.
  611. Application of herb chronology: Annual fertilization and climate reveal annual ring signatures within the roots of US tallgrass prairie plants“. JR Dee, MW Palmer. 2016. NRC Research Press Botany. 2 cites.
  612. Attribute-based authentication schemes: a survey“. H Yang, V Oleshchuk. 2015. computingonline.net International Journal of Computing. 2 cites.
  613. Black-Box Knowledge Extraction Revisited: Universal Approach with Precise Bounds.“. E Käsper, S Laur, H Lipmaa. 2006. eprint.iacr.org IACR Cryptology ePrint Archive. 2 cites.
  614. Blind ring signatures secure under the chosen-target-CDH assumption information security“. H Javier, L Fabien. 2006. springer-verlag LNCS. 2 cites.
  615. Brush scrubbing scratches reduction methods in post CMP cleaning“. H Soondrum. 2012. ma.ecsdl.org Meeting Abstracts. 2 cites.
  616. Certificateless ring signature scheme from anonymous subsets“. H Wang. 2010. ieeexplore.ieee.org … Information Networking and Security (MINES), 2010 …. 2 cites.
  617. Charge Fractionalization in a Mesoscopic Ring“. W DeGottardi, S Lal, S Vishveshwara. 2013. APS Physical review letters. 2 cites.
  618. Cloud Data Auditing Techniques with a Focus on Privacy and Security“. M Kolhar, MM Abu-Alhaj, SMA El-atty. 2017. ieeexplore.ieee.org IEEE Security & Privacy. 2 cites.
  619. Collusion-resistant convertible ring signature schemes“. JY Hwang, KY Chang, HS Cho, B Song…. 2015. Springer Science China Information …. 2 cites.
  620. Computational and Symbolic Anonymity in an Unbounded Network“. H Comon-Lundh, Y Kawamoto, H Sakurada. 2009. jstage.jst.go.jp JSIAM Letters. 2 cites.
  621. Concentric Ring Signature (CORS) for 3D Object Detection Recognition, and Registration“. H Van Nguyen, F Porikli. 2011. Elsevier Pattern Recognition,. 2 cites.
  622. Constant size ring signature without random oracle“. P Bose, D Das, CP Rangan. 2015. Springer Australasian Conference on Information …. 2 cites.
  623. Contract Net Model Based on Bit Commitment [J]“. W WAN, W SUO, Y CHEN. 2009. en.cnki.com.cn Computer Engineering. 2 cites.
  624. Convertible Perfect Concurrent Signature Protocol“. H Jiang, Q Xu, C Zhang. 2010. ieeexplore.ieee.org Computational Intelligence and …. 2 cites.
  625. Convertible ring signatures with gradual revelation of non‐signers“. R Tso. 2012. Wiley Online Library Security and Communication Networks. 2 cites.
  626. Cryptanalysis and improvement of a concurrent signature scheme based on identity“. Z Zhang, S Xu. 2011. ieeexplore.ieee.org … and Service Science (ICSESS), 2011 IEEE …. 2 cites.
  627. Cryptanalysis and improvement of a ring signature based on ElGamal signature“. H Wang, S Han, C Deng…. 2009. ieeexplore.ieee.org … Engineering, 2009. WCSE’ …. 2 cites.
  628. Cryptanalysis of several linkable ring signature schemes“. H Wang, S Zhao. 2010. ieeexplore.ieee.org Networks Security Wireless Communications …. 2 cites.
  629. Crypto-Book: Bootstrapping Privacy Preserving Online Identities from Social Networks“. J Maheswaran, D Jackowitz, DI Wolinsky…. 2014. arxiv.org arXiv preprint arXiv …. 2 cites.
  630. Data Sharing in Cloud Using Identity Based Ring Signature“. N Shirsath Priyanka, K BECOMP. 2015. irjet.net International Research Journal of …. 2 cites.
  631. Decentralized access control with Anonymous authentication of data stored in cloud“. CMSR Krishna, GJ Samuel. 2016. ijitech.org . 2 cites.
  632. Design and Evaluation for a Multi-Cloud Based Storage System with Privacy Preserving“. Y Fan, Z Qiao, M Xiao. 2014. ieeexplore.ieee.org … , and Storage (NAS), 2014 9th IEEE …. 2 cites.
  633. Distributed anonymized communications“. R Hodgman, ME Van Dijk, E Kolman. 2015. Google Patents US Patent 9,015,231. 2 cites.
  634. Efficient and random oracle-free conditionally anonymous ring signature“. S Zeng, Z Qin, Q Lu, Q Li. 2012. Springer International Conference on Provable Security. 2 cites.
  635. English Auction Protocol Based on Ring Signatures [J]“. WU Ke-li. 2006. en.cnki.com.cn Computer Engineering and Applications. 2 cites.
  636. Escrowed linkability of ring signatures and its applications. VIETCRYPT 2006, LNCS vol. 4341“. S Chow, W Susilo, TH Yuen. 2006. Springer . 2 cites.
  637. Fast object recognition using a hybrid optical/digital processor.“. DJF Walker, CR Chatwin. 1990. pdfs.semanticscholar.org BMVC. 2 cites.
  638. Forward-secure traceable ring signature“. C Hu, D Li. 2007. ieeexplore.ieee.org … , and Parallel/Distributed Computing, 2007. SNPD …. 2 cites.
  639. Generation and Tate pairing computation of ordinary elliptic curves with embedding degree one“. Z Hu, L Wang, M Xu, G Zhang. 2013. Springer International Conference on Information …. 2 cites.
  640. Group signature with deniability: how to disavow a signature“. A Ishida, K Emura, G Hanaoka, Y Sakai…. 2017. search.ieice.org … on Fundamentals of …. 2 cites.
  641. ID-based ring signatures for general families of signing subsets“. J Herranz, G Sáez. 2005. Submitted . 2 cites.
  642. ID-based Threshold Ring Signature Scheme Without Trusted Party [J]“. X LI, M HE, D LUO. 2008. en.cnki.com.cn Computer Engineering. 2 cites.
  643. Identity-based directed proxy ring signature scheme“. KA Ajmath, PV Reddy, BU Rao…. 2012. Taylor & Francis Journal of Discrete …. 2 cites.
  644. Identity-Based Ring Signatures fromRSA“. I Javier Herranz. 0. Artificial Intelligence Research Institute, CSIC, Spanish …. 2 cites.
  645. Identity-based threshold ring signcryption from pairing“. L Deng, S Li, Y Yu. 2014. inderscienceonline.com International Journal of Electronic …. 2 cites.
  646. J. stern, M. Szydlo, Threshold Ring Signatures and Applications to Ad-hoc Groups, LNCS, CRYTO 2002“. E Bresson. 2002. Berlin: Springer-Verlag . 2 cites.
  647. Key Agreement from Signatures: Improved Protocols and Anonymous Extension“. S Chow, KK Choo. 2007. researchgate.net . 2 cites.
  648. Laribus: privacy-preserving detection of fake SSL certificates with a social P2P notary network“. A Micheloni, KP Fuchs, D Herrmann…. 2013. ieeexplore.ieee.org … and Security (ARES) …. 2 cites.
  649. Linkable and culpable ring signatures“. JK Liu, VK Wei, DS Wong. 2003. Manuscript . 2 cites.
  650. Logarithmic size ring signatures without random oracles“. C Gritti, W Susilo, T Plantard. 2016. IET IET Information Security. 2 cites.
  651. Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin.“. T Ruffing, P Moreno-Sanchez. 2017. fc17.ifca.ai IACR Cryptology ePrint Archive. 2 cites.
  652. New Distributed Ring Signatures for General Families of Signing Subsets.“. J Herranz, G Sáez. 2004. eprint.iacr.org IACR Cryptology ePrint Archive. 2 cites.
  653. Non‐interactive deniable ring signature without random oracles“. S Zeng, Q Li, Z Qin, Q Lu. 2016. Wiley Online Library Security and Communication …. 2 cites.
  654. Non‐interactive deniable ring signature without random oracles“. S Zeng, Q Li, Z Qin, Q Lu. 2016. Wiley Online Library Security and Communication …. 2 cites.
  655. On Privacy and Integrity in Vehicular Ad hoc Networks.“. P Caballero-Gil, C Caballero-Gil, J Molina-Gil…. 2010. researchgate.net ICWN. 2 cites.
  656. On Privacy Losses in the Trusted Agent Model“. P Mateus, S Vaudenay. 2009. infoscience.epfl.ch EUROCRYPT” 09. 2 cites.
  657. Online/Off-line Ring Signature Scheme with Provable Security.“. J Kar. 2015. eprint.iacr.org ISI. 2 cites.
  658. PPAA: Peer-to-peer anonymous authentication (extended version)“. PP Tsang, SW Smith. 2008. pdfs.semanticscholar.org . 2 cites.
  659. Privacy in Mobile Ad Hoc Networks“. BJ Vazram, VV Kumari, JVR Murthy. 2011. Springer Advances in Digital Image …. 2 cites.
  660. Progress in Cryptology-VIETCRYPT 2006“. PQ Nguyen. 2006. Springer . 2 cites.
  661. Proof of signer and privacy revocation in ring signatures“. H Kikuchi. 2003. ci.nii.ac.jp 4th International Workshop on Information Security …. 2 cites.
  662. Public audit of cloud shared data by using efficient privacy preserving scheme“. F Malugu, KS Babu. 2015. ijser.in Journal of Scientific Engineering and Research. 2 cites.
  663. Relaxed security notions for signatures of knowledge“. M Fischlin, C Onete. 2011. Springer … Conference on Applied Cryptography and Network …. 2 cites.
  664. Review of CryptoNote white paper“. S Noether. 2014. bravenewcoin.com … http://monero. cc/downloads/whitepaper_review. pdf …. 2 cites.
  665. Ring group signatures“. L Chen. 2012. ieeexplore.ieee.org Trust, Security and Privacy in Computing and …. 2 cites.
  666. Scheme on user identity attribute preserving based on ring signcryption for cloud computing“. L Shuan-bao, F Jian-ming, Z Huan-guo…. 2014. chinacloud.cn Journal on …. 2 cites.
  667. Secure anonymously authenticated and traceable enterprise DRM system“. MH Ibrahim. 2015. search.proquest.com International Journal of Computer Applications. 2 cites.
  668. Self-certified ring signatures“. N Li, Y Mu, W Susilo, F Guo. 2011. dl.acm.org Proceedings of the 6th ACM Symposium …. 2 cites.
  669. Self-proved ring signatures and Ring Sign-Cryption Algorithm in Mobile ad hoc network [D]“. F You-miao. 2005. He Fei: University of science and technology of China …. 2 cites.
  670. Separable identity-based deniable authentication: cryptographic primitive for fighting phishing“. W Susilo, Y Mu. 2006. Springer European Public Key Infrastructure Workshop. 2 cites.
  671. Short (resp. Fast) CCA2-Fully-Anonymous Group Signatures using IND-CPA-Encrypted Escrows.“. VK Wei. 2005. pdfs.semanticscholar.org IACR Cryptology ePrint Archive. 2 cites.
  672. Short linkable ring signatures f0r E—voting, E cash and attestation“. PP Tsang, VK Wei. 0. Pine. First lnfor—marion Security Practice and …. 2 cites.
  673. Signer-traceable Ring Signcryption Scheme [J]“. QY Sun, KL Wu, HY Xu. 2011. en.cnki.com.cn Computer Engineering. 2 cites.
  674. Study on ring signature and its application“. X Zhou. 2009. ieeexplore.ieee.org Control and Decision Conference, 2009. CCDC’09 …. 2 cites.
  675. Survey on privacy preserving public auditing techniques for shared data in the cloud“. KJ Rasal, DSV Gumaste, SA Kahate. 2015. ijesit.com Journal of Engineering Science and …. 2 cites.
  676. The Degree of Privacy in Web-based Electronic Health Records“. D Slamanig, C Stingl. 2009. Springer 4th European Conference of the International …. 2 cites.
  677. The Yellowstone Petrified Forests“. JD Morris. 1995. slservicios.com . 2 cites.
  678. Threshold ring signatures for ad-hoc groups, Crypto’02, LNCS 2442“. E Bresson, J Stem, M Szydlo. 2002. Springer-Verlag . 2 cites.
  679. Toward the fair anonymous signatures: deniable ring signatures“. Y Komano, K Ohta, A Shimbo…. 2007. search.ieice.org IEICE Transactions on …. 2 cites.
  680. Towards Unconditional Anonymity: Privacy Enforcement Model in Web Services“. Y Yang, J Yang. 2008. ieeexplore.ieee.org Congress on Services Part II, 2008 …. 2 cites.
  681. Two Stories of Ring Signatures. Crypto 2005 rump session talk“. Y Hanatani, K Ohta. 2005. . 2 cites.
  682. Uncorrelatable electronic transactions using ring signatures“. PD Chowdhury, B Christianson. 2004. researchgate.net Proceedings of the Wholes …. 2 cites.
  683. Using resultants for SAGBI basis verification in the univariate polynomial ring“. A Torstensson, V Ufnarovski, H Öfverbeck. 2005. Elsevier Journal of Symbolic …. 2 cites.
  684. 唱 16.[12] CHOW S SM, WEI UK, LIU JK, et al“. 唱VerlagSpringer. 0. Ring signatures without ran 唱, 1. 2 cites.
  685. 基于环 Zn 上圆锥曲线的前向安全环签名方案“. 王玲玲, 张国印, 马春光. 2008. 计算机工程. 2 cites.
  686. 基于身份的可链接和可转换环签名“. 王少辉, 郑世慧, 展涛. 2008. jeit.ie.ac.cn 电子与信息学报. 2 cites.
  687. 基于身份的可链接和可转换环签名“. 王少辉, 郑世慧, 展涛. 2008. jeit.ie.ac.cn 电子与信息学报. 2 cites.
  688. 改进的标准模型下的基于身份的环签名方案倡“. 程文华, 王彩芬, 韩亚宁, 张玉磊. 2009. arocmag.com 计算机应用研究. 2 cites.
  689. (Strong) multidesignated verifiers signatures secure against rogue key attack“. MH Au, G Yang, W Susilo…. 2014. Wiley Online Library … and Computation: Practice …. 1 cites.
  690. A dendrochronological assessment of two tree species to reconstruct climate on the Fraser Plateau, British Columbia“. Z Gedalof, R Au, B Blundon, G Carnwath…. 2008. researchgate.net Report on the 18th …. 1 cites.
  691. A Forward-secure Anonymity Signature Scheme Based on Ring Signature Idea [J]“. ZZMAO Ming. 2010. en.cnki.com.cn Microcomputer Information. 1 cites.
  692. A linkable and convertible ID-based ring signature“. X Shen, M Xu, Y Zhao. 2011. ieeexplore.ieee.org Computational and Information …. 1 cites.
  693. A new identity-based ring signcryption scheme“. L Deng, J Zeng, S Li. 2014. inderscienceonline.com International Journal of Electronic …. 1 cites.
  694. A Note on Shacham and Waters Ring Signatures“. P Wei, M Wang, W Wang. 2007. ieeexplore.ieee.org Computational Intelligence and …. 1 cites.
  695. A Privacy Preserving of Composite Private/Public Key in Cloud Servers“. OS Nagesh. 2014. ijcttjournal.org International Journal of Computer Trends and …. 1 cites.
  696. A Provably Secure Ring Signature Scheme with Bounded Leakage Resilience.“. H Wang, Q Wu, B Qin, F Zhang, J Domingo-Ferrer. 2014. books.google.com ISPEC. 1 cites.
  697. A reputation system supporting unlinkable, yet authorized expert ratings“. A Kokoschka, R Petrlic, C Sorge. 2015. dl.acm.org Proceedings of the 30th Annual ACM …. 1 cites.
  698. A Review on Implementation of Message Authentication Scheme for Elliptic Curve Cryptography in Wireless Sensor Networks“. M Ghonge, MS Kale. 2016. ijsrset.com International Journal of Scientific Research in …. 1 cites.
  699. A Scheme of Electronic Auction Based on Ring Signature [J]“. W Xiao-ming. 2011. en.cnki.com.cn Computer Knowledge and Technology. 1 cites.
  700. A Strong Designated Verifier Ring Signcryption Scheme Providing Strongest Signers’ Anonymity.“. SJ Hwang, JY Chen. 2014. pdfs.semanticscholar.org J. Inf. Sci. Eng.. 1 cites.
  701. A Strong Designated-Verifier Ring Signature Scheme Providing One-Out-of-All Signer Anonymity“. SJ Hwang, KL Cheng. 2011. airitilibrary.com 網際網路技術學刊. 1 cites.
  702. A Strong Designated-Verifier Ring Signature Scheme Providing One-Out-of-All Signer Anonymity“. SJ Hwang, KL Cheng. 2011. airitilibrary.com 網際網路技術學刊. 1 cites.
  703. A survey of ring signature“. LWGZ Chunguang. 0. 万方数据资源系统. 1 cites.
  704. An attribute-based anonymous authentication scheme“. W Hongbin, R Yan. 2013. ieeexplore.ieee.org Emerging Intelligent Data and Web …. 1 cites.
  705. An attribute-based ring signature scheme in lattice“. W Li, M Fan, Z Jia. 2012. Springer Wuhan University Journal of Natural Sciences. 1 cites.
  706. An Efficient Anonymous Authenticated Key Agreement Protocol for Vehicular Ad-Hoc Networks Based on Ring Signatures and the Elliptic Curve Integrated Encryption …“. C Büttner, SA Huss. 2015. Springer … Conference on Information Systems Security and …. 1 cites.
  707. An efficient certificateless ring signature scheme“. L Zhu, F Zhang. 2008. Springer Wuhan University Journal of Natural Sciences. 1 cites.
  708. An improved ring signature scheme without trusted key generation center for wireless sensor network“. J Xiao, G Zeng. 2009. Springer Journal of Shanghai Jiaotong University (Science). 1 cites.
  709. An investigation into Confidential Transactions.“. A Gibson. 2016. pdfs.semanticscholar.org h ttps://github. com/AdamISZ …. 1 cites.
  710. Analysis and Improvement of Ring Signature Scheme Based on Quadratic Residues“. F WANG, L WEI, W GAO. 2012. en.cnki.com.cn Journal of Jiamusi University (Natural …. 1 cites.
  711. Analysis and Improvement of Ring Signature Scheme Based on Quadratic Residues“. F WANG, L WEI, W GAO. 2012. en.cnki.com.cn Journal of Jiamusi University (Natural …. 1 cites.
  712. Analysis on the t-out-of-n Ring Signatures from Discrete Logarithm Public Keys“. J Shang, Q Xu, H Jiang. 2006. GAI-KAN BIAJIBU MINIMICRO SYSTEMS-SHENYANG-. 1 cites.
  713. Anonymity-preserving identity-based multisignature scheme with provision for origin Self-Revelation“. W Goh, CK Yeo. 2013. ieeexplore.ieee.org Global Communications Conference …. 1 cites.
  714. Anonymizable signature and its construction from pairings“. F Hoshino, T Kobayashi, K Suzuki. 2010. Springer International Conference on Pairing …. 1 cites.
  715. Anonymous Communication Protocol in Overlay Networks“. J Ren, T Li, K Han. 2008. ieeexplore.ieee.org … . ICC’08. IEEE International Conference on. 1 cites.
  716. Anonymous evaluation system“. K Kluczniak, L Hanzlik, P Kubiak…. 2015. Springer … Conference on Network …. 1 cites.
  717. Applications of pairings in grid security“. A Saxena, B Soh. 2006. ieeexplore.ieee.org Communication System Software and …. 1 cites.
  718. Attribute-based ring signatures: Security analysis and a new construction“. R Toluee, MR Asaar…. 2013. ieeexplore.ieee.org Information Security and …. 1 cites.
  719. Breaking a proxy ring signature with revocable anonymity in MINE2009“. J Zhang, H Chen. 2010. ieeexplore.ieee.org … and Digital Society (ICNDS), 2010 2nd …. 1 cites.
  720. Building privacy-preserving cryptographic credentials from federated online identities“. J Maheswaran, D Jackowitz, E Zhai…. 2016. dl.acm.org Proceedings of the …. 1 cites.
  721. Certificateless Ring Signature Scheme without Pairing [J]“. T YU, Z ZHAO, X REN. 2012. en.cnki.com.cn Journal of Hangzhou Dianzi University. 1 cites.
  722. Concurrent Signatures without a Conventional Keystone“. Y Mu, D Wong, L Chen, W Susilo…. 2008. books.google.com Proceedings of the First …. 1 cites.
  723. Contributions of dendrochronology to flood hazard analysis in the Red River Basin, Manitoba“. SS George, E Nielsen. 0. manitoba.ca. 1 cites.
  724. Cramer–Damgård signatures revisited: Efficient flat-tree signatures based on factoring“. D Catalano, R Gennaro. 2007. Elsevier Theoretical computer science. 1 cites.
  725. Cryptographic privacy enhancing technologies“. LD Nguyen. 2005. ro.uow.edu.au . 1 cites.
  726. Dendrochronology of submerged Bulgarian sites“. PI Kuniholm, MW Newton, B Kromer. 2007. Springer The Black Sea Flood Question …. 1 cites.
  727. Dual Construction of Stern-based Signature Schemes“. PL Cayrel, SMEY Alaoui. 2010. tk.informatik.tu-darmstadt.de World Academy of Science …. 1 cites.
  728. Efficient Light-weight Proxy Ring Signature Scheme For VANETs“. J Zhang, L Liu, M Xu, Y Cui. 2012. Advanced Institutes of Convergence … International …. 1 cites.
  729. Efficient linkable ring signatures and threshold signatures from linear feedback shift register“. X Li, D Zheng, K Chen. 2007. Springer … Conference on Algorithms and Architectures for …. 1 cites.
  730. Efficient Multivariate Ring Signature Schemes.“. MSE Mohamed, A Petzoldt. 2017. eprint.iacr.org IACR Cryptology ePrint Archive. 1 cites.
  731. Efficient ring signature schemes over NTRU Lattices“. YH Zhang, Y Hu, J Xie, M Jiang. 2016. Wiley Online Library Security and Communication …. 1 cites.
  732. Efficient ways of prime number generation for ring signatures“. JL Salazar, JL Tornos, JJ Piles. 2016. IET IET Information Security. 1 cites.
  733. Enhanced Ring Signatures Schemes for Privacy Preservation in Wireless Sensor Networks“. S Mishra, M Pandey. 2014. search.proquest.com International Journal of Modern …. 1 cites.
  734. Financial Cryptography and Data Security: 17th International Conference, FC 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers“. AR Sadeghi. 2013. books.google.com . 1 cites.
  735. Forcing out a confession: Threshold discernible ring signatures“. S Kumar, S Agrawal, R Venkatesan…. 2010. ieeexplore.ieee.org … ), Proceedings of the …. 1 cites.
  736. Forking lemmas in the ring signatures’ seena—rio“. J Herranz, G Sáez. 0. eprint.iacr.org 2003—04—10. 1 cites.
  737. Forward secure identity based ring signature scheme for images“. SN Saranya, P Thilagavathi, M Tharani. 2015. Citeseer Int. J. Adv. Info. Comm. Tech.. 1 cites.
  738. Hard invalidation of electronic signatures“. L Hanzlik, M Kutyłowski, M Yung. 2015. Springer Information Security Practice and …. 1 cites.
  739. Hierarchical ring signatures“. L Krzywiecki, M Kutylowski…. 2009. kutylowski.im.pwr.wroc.pl Slides presented at’ …. 1 cites.
  740. How to Leak a Secret and Reap the Rewards too“. V Saraswat, SK Pandey. 2014. Springer … on Cryptology and Information Security in Latin …. 1 cites.
  741. Identity Based Proxy Signature from RSA without Pairings.“. L Deng, H Huang, Y Qu. 2017. pdfs.semanticscholar.org IJ Network Security. 1 cites.
  742. Improved blind signature schemes based on XTR system [J]“. X DING, Z FU, S ZHANG. 2008. en.cnki.com.cn Journal of Computer Applications. 1 cites.
  743. Improved ID-based ring signature scheme with constant-size signatures“. H Li, X Li, M He, S Zeng. 2011. informatica.si Informatica. 1 cites.
  744. Improved lattice-based ring signature schemes from basis delegation“. G Wen, H Yupu, W Baocang, X Jia. 2016. Elsevier The Journal of China Universities of …. 1 cites.
  745. Improving Obfuscation in the CryptoNote Protocol“. A Mackenzie, S Noether, MC Team. 2015. bravenewcoin.com . 1 cites.
  746. Information Security Practice and Experience: 10th International Conference, ISPEC 2014, Fuzhou, China, May 5-8, 2014, Proceedings“. X Huang, J Zhou. 2014. books.google.com . 1 cites.
  747. Information Security: 9th International Conference; ISC 2006, Samos Island, Greece, August 30-September 2, 2006, Proceedings“. SK Katsikas, M Backes, S Gritzalis, B Preneel. 2006. books.google.com . 1 cites.
  748. Legally fair contract signing without keystones“. H Ferradi, R Géraud, D Maimuț, D Naccache…. 2016. Springer … Conference on Applied …. 1 cites.
  749. Limited-linkable Group Signatures with Distributed-Trust Traceability“. C Hlauschek, J Black, G Vigna, C Kruegel. 2012. researchgate.net . 1 cites.
  750. Maintaining unlinkability in group based P2P environments“. J Arnedo-Moreno…. 2009. ieeexplore.ieee.org … , 2009. WETICE’09. 18th …. 1 cites.
  751. Monero is Not That Mysterious“. S Noether, S Noether. 2014. lab.getmonero.org . 1 cites.
  752. Multi authority attribute based encryption against data integrity and scalability issues in cloud data services“. A Praveena, C Sasikala. 2015. ieeexplore.ieee.org Innovations in Information …. 1 cites.
  753. Multi-ring signatures of the oscillation in a water Cherenkov detector“. AE Asratyan, GV Davidenko, AG Dolgolenko…. 2003. Springer The European Physical …. 1 cites.
  754. New Certificateless Blind Ring Signature Scheme“. H Sun. 2014. iaescore.com Indonesian Journal of Electrical Engineering and …. 1 cites.
  755. Nonlinear blind channel equalization via ring decision feedback“. BP Paris, H Chen. 1998. ieeexplore.ieee.org Information Theory, 1998. Proceedings …. 1 cites.
  756. Notions of Deniable Message Authentication“. M Fischlin, S Mazaheri. 2015. dl.acm.org Proceedings of the 14th ACM Workshop on …. 1 cites.
  757. On Secure Group Admission Control Using ICMetrics“. H Tahir, G Howells, H Hu, D Gu…. 2014. ieeexplore.ieee.org … (EST), 2014 Fifth …. 1 cites.
  758. On the Security of a Lattice-Based Multi-party Concurrent Signature Scheme“. X Mao, K Chen, L Wang, Y Long. 2014. ieeexplore.ieee.org Intelligent Networking and …. 1 cites.
  759. On the security of an enhanced ID-based anonymous proxy signature scheme in ICCAE2010“. J Zhang, Y Xu. 2012. ieeexplore.ieee.org … and Collaborative Systems (INCoS), 2012 4th …. 1 cites.
  760. One-time zero sum ring signature“. C Fromknecht. 2016. scalingbitcoin.org . 1 cites.
  761. Optimized coke cutting method for decoking substantially free-flowing coke in delayed cokers“. GE Phillips, CJ Mart. 2010. Google Patents US Patent 7,815,775. 1 cites.
  762. Periodic Updation in TPA for Secure Dynamic Audit Services of Outsourced Storages in Clouds“. NS Priya. 2015. jncet.org Journal of Network Communications and Emerging …. 1 cites.
  763. POSTER: Deniable Anonymous Group Authentication“. E Syta, B Ford. 2013. ieee-security.org Proceedings of the IEEE Symposium on Security …. 1 cites.
  764. Privacy-preserving PKIs with reduced server trust“. G Di Crescenzo, T Zhang. 2012. ieeexplore.ieee.org Communications (ICC), 2012 IEEE …. 1 cites.
  765. Reconstruction of debris-flow dynamics and triggers since AD 1570–Looking back to a decade of tree-ring research at Ritigraben (Valais, Switzerland) …“. M Stoffel. 2011. ijege.uniroma1.it 5th International Conference on Debris-Flow Hazards …. 1 cites.
  766. Remote Attestation on Trusted Cloud Computing“. BL Yang, H Guo. 2015. Trans Tech Publ Applied Mechanics and Materials. 1 cites.
  767. Research and implementation of highly-efficient anonymous electronic voting scheme based on ring signature and blind signature“. Y Yaojun, H Haiyan. 2012. ieeexplore.ieee.org World Automation Congress (WAC) …. 1 cites.
  768. Ring signature with divided private key.“. S Flonta, LC Miclea. 2010. eprint.iacr.org IACR Cryptology ePrint Archive. 1 cites.
  769. Ring Signature with Weak Linkability and its Application“. I Rae, J Ok, D Hoon. 0. IEEE Trans. 1 cites.
  770. Ring signatures based homomorphic authentication for public auditing in Cloud“. P Rahul, T Malathi, S Archana. 2015. ijraet.com Advanced Engineering Technologies. 1 cites.
  771. Schnorr ring signature scheme with designated revocability“. X Lv, Z Wang, F Qian, F Xu. 2012. Taylor & Francis Intelligent Automation & Soft …. 1 cites.
  772. Secure efficient history-hiding append-only signatures in the standard model“. B Libert, M Joye, M Yung, T Peters. 2015. Springer IACR International Workshop on …. 1 cites.
  773. Security technologies and applications for convergence environments“. JJ Park, SJ Wang, D Sauveron. 2012. Wiley Online Library Security and Communication …. 1 cites.
  774. Self-certified digital signatures“. N Li. 2011. ro.uow.edu.au . 1 cites.
  775. Signatures for Multi-source Network Coding“. Y Mingxi, L Jiao, L Layuan. 2010. … NO 13 WEST CHANG AN AVENUE … China …. 1 cites.
  776. Survey on Privacy Preserving Public Auditing for Shared Data in Cloud“. P Kapadne. 2015. pnrsolution.org . 1 cites.
  777. The Evolution of Self-Organized Privacy“. J Freudiger. 2008. EPFL . 1 cites.
  778. Threshold discernible ring signatures“. S Kumar, S Agrawal, R Venkatesan, SV Lokam…. 2010. Springer ICETE. 1 cites.
  779. Threshold Ring Signatures Efficient for Large Sets of Signers.“. K Maneva-Jakimoska, G Jakimoski…. 2005. eprint.iacr.org IACR Cryptology ePrint …. 1 cites.
  780. Two-Party (Blind) Ring Signatures and Their Applications.“. MH Au, W Susilo. 2014. books.google.com ISPEC. 1 cites.
  781. リング署名における署名者の証明と匿名性破棄プロトコル“. 菊池浩明, 多田美奈子, 中西祥八郎. 2004. ipsj.ixsq.nii.ac.jp 情報処理学会論文誌. 1 cites.
  782. リング署名プロトコルにおける署名者開示“. 菊池浩明, 多田美奈子, 中西祥八郎. 2003. ipsj.ixsq.nii.ac.jp 情報処理学会研究報告 …. 1 cites.
  783. 基于有限惩罚建立无线自组网的激励机制倡“. 魏华, 孙浩, 周雪梅. 2009. arocmag.com 计算机应用研究. 1 cites.
  784. (Hierarchical Identity-Based) Threshold Ring Signatures.“. VK Wei, TH Yuen. 2006. IACR Cryptology ePrint Archive. 0 cites.
  785. … Certification after RegistrationUndeniable and Unpretendable SignaturesSub-Linear Size Traceable Ring Signatures without Random OraclesAn Efficient …“. J RYU. 0. search.ieice.org. 0 cites.
  786. … Certification after RegistrationUndeniable and Unpretendable SignaturesSub-Linear Size Traceable Ring Signatures without Random OraclesAn Efficient …“. J RYU. 0. search.ieice.org. 0 cites.
  787. … Ring-Signaturen für die Car2X-Kommunikation unter Verwendung von sicherem Speicher: Implementation of ring signatures for Car2X-Communication …“. J Wagener. 2014. . 0 cites.
  788. 2008 Index IEEE Transactions on Dependable and Secure Computing Vol. 5“. S Bagchi, E Bertino, B Blanchet, D Brumley…. 2008. Computer networks. 0 cites.
  789. A chronology of climatic downturns through the mid-and late-Holocene: tracing the distant effects of explosive eruptions from palaeoclimatic and historical …“. J Holopainen, M Macias-Fauria, M Timonen…. 2013. Co-Action Publishing . 0 cites.
  790. A Forward Secure Ring Signature Scheme“. B Wansu, W Yun. 2008. ieeexplore.ieee.org Intelligent Information Hiding and Multimedia …. 0 cites.
  791. A LITERATURE SURVEY ON A NOVEL PRIVACY PRESERVING PUBLIC AUDITING MECHANISM ON SHARED CLOUD DATA USING ORUTA“. MA Priyanga, PDRV Kumar. 0. ijarece.org. 0 cites.
  792. A LITERATURE SURVEY ON SECURITY BASED FORWARD RING SIGNATURE SCHEME USING IDENTITY INFORMATION“. V Dhinakari, R NallaKumar, LS Santhoshkumar. 0. ijcrcst.com. 0 cites.
  793. A New Aggregate Signature Scheme in Cryptographic Currency“. C Yuan, M Xu, X Si. 0. ijpe-online.com International Journal of Performability Engineering. 0 cites.
  794. A New Approach to Threshold Attribute Based Signatures“. SSD Selvi, S Venugopalan, CP Rangan. 0. pdfs.semanticscholar.org. 0 cites.
  795. A new certificateless self-identifiable ring signature scheme“. Y Sang, L You. 2010. ieeexplore.ieee.org … Engineering and Informatics (BMEI), 2010 3rd …. 0 cites.
  796. A New Multivariate-based Ring Signature Scheme“. L ling Wang. 2013. atlantis-press.com . 0 cites.
  797. A New Ring Signature Scheme with Multiple Functions“. J He, B Liu. 2012. dianzikeji.org Dianzi Keji- Electronic Science and Technology. 0 cites.
  798. A New SDV Anonymous Proxy Signature Scheme“. X Wang. 2010. ieeexplore.ieee.org Computational Aspects of Social Networks (CASoN) …. 0 cites.
  799. A Novel Approach for Auditing for Data in the Cloud by Using Privacy-Preserving Techniques“. B Ravikumar, P Venuthurumilli. 2015. International Journal of Research. 0 cites.
  800. A Novel Method for Blocking Misbehaving Users over Anonymizing Networks“. ANVK Gopichand, SG Gouse. 0. pdfs.semanticscholar.org. 0 cites.
  801. A Privacy Preserving Techniques to Improve Privacy and Efficiency of Smart Grid Technology“. AP Nazimunisa, VS Kamalam…. 2016. jncet.org Journal of Network …. 0 cites.
  802. A provable secure anonymous proxy signature scheme without random oracles.“. R Toluee, MR Asaar…. 2013. pdfs.semanticscholar.org IACR Cryptology ePrint …. 0 cites.
  803. A Ring Signature Scheme“. R signatures are introduced by Shamir. 0. . 0 cites.
  804. A Ring Signature Scheme Based on Bilinear Pairings“. CAI Qing-hua. 2006. en.cnki.com.cn Microcomputer Applications. 0 cites.
  805. A ring signature scheme with anonymous strong-designated verifiers“. 莊嘉富. 2015. tkuir.lib.tku.edu.tw . 0 cites.
  806. A Secure Distributed Nymble for Blocking Misbehaving Users in Anonymizing Networks“. N Theja, T Jayakumari. 2012. ciitresearch.org Networking and Communication …. 0 cites.
  807. A Short Linkable Ring Signature Scheme for E-Cash Protocol“. L WANG, G ZHANG, C MA. 2008. en.cnki.com.cn Journal of Beijing University of Posts …. 0 cites.
  808. A Survey of Privacy Preserving Auditing Techniques for Shared Data in Cloud Computing“. R Kapadiya, J Prajapati. 2015. search.proquest.com International Journal of Computer …. 0 cites.
  809. A Threshold Ring Signature Scheme with a Variety of Keys“. MJ Hinek. 2004. pdfs.semanticscholar.org . 0 cites.
  810. A Verifiable Ring Signature Scheme Based on Multivariate Public-Key Cryptosystem“. LL Wang. 2013. Trans Tech Publ Applied Mechanics and Materials. 0 cites.
  811. A Worthwhile Authentication and Unidentified Data Sharing with Advance Security“. KC LAKSHMI, CMD GULZAR. 2016. ijitech.org . 0 cites.
  812. Advanced Traceability Mechanism for Shared Data in the Cloud“. KJ Rasal, SA Kahate. 0. ijettjournal.org. 0 cites.
  813. An anonymous ring signature scheme with strong specified verifiers“. 鄭凱隆. 2009. tkuir.lib.tku.edu.tw . 0 cites.
  814. An Efficient (nt)-out-of-n Threshold Ring Signature Scheme“. T Isshiki, K Tanaka. 2003. researchgate.net . 0 cites.
  815. An Efficient Blind Ring Signature Scheme“. J Zhang, X Liu. 2010. ieeexplore.ieee.org … ICIE), 2010 WASE International Conference on. 0 cites.
  816. An Efficient Code-Based Threshold Ring Signature Scheme with a Leader-Participant Model“. G Zhou, P Zeng, X Yuan, S Chen…. 2017. hindawi.com Security and …. 0 cites.
  817. An Efficient Identity-Based Concurrent Signature Scheme“. J Zhang, S Gao. 2010. ieeexplore.ieee.org Information Technology and Applications …. 0 cites.
  818. An Efficient Privacy Preserving Scheme over Encrypted Data in Cloud“. K Panmand, S Kadam. 0. pdfs.semanticscholar.org. 0 cites.
  819. An efficient ring signature scheme for privacy and anonymous communication“. L Wang, G Zhang, C Ma. 2007. ieeexplore.ieee.org … and E-Commerce, 2007. ISDPE 2007 …. 0 cites.
  820. An efficient ring signature scheme for privacy and anonymous communication“. L Wang, G Zhang, C Ma. 2007. ieeexplore.ieee.org … and E-Commerce, 2007. ISDPE 2007 …. 0 cites.
  821. An efficient strong designated-verifier ring signature scheme providing maximal signer’s anonymity“. 陳炯燁. 2010. tkuir.lib.tku.edu.tw . 0 cites.
  822. An Improved and Trustworthy Communication Framework in Wireless Sensor Network’s“. PVKM Sreenivasulu. 0. ijiset.com. 0 cites.
  823. An Original Privacy Protective Mechanism That Supports Public Auditing On Shared Information Hold on Within the Cloud“. M PRAMEELA, DRTS LATHA. 2015. . 0 cites.
  824. An Public Auditing Mechanism for Shared Data in the Cloud“. S Rizwana, DW Tahseen. 2015. International Journal of Research. 0 cites.
  825. Analysis of Fair Concurrent Signature Exchange Protocol using ATL“. PE Phyu, KKK Kyaw. 2014. ijsetr.com . 0 cites.
  826. Attribute-Based Signatures with DNF Policies“. KS Lee, JY Hwang, HJ Kim…. 2009. koreascience.or.kr Journal of the Institute of …. 0 cites.
  827. Audit with Privacy and Data Distribution in Cloud Computing“. P Anusha, IRP Reddy. 0. ijracse.com. 0 cites.
  828. Auditing Shared Data in Cloud through Privacy Preserving Mechanisms: A Survey“. VR Babu, S EnReddy. 2016. indianjournals.com … of Innovation in Computer Science and …. 0 cites.
  829. Auditing the Shared Data in Cloud through Privacy Preserving Mechanisms“. VR Sai, VL Naidu, A Srinivasulu. 2015. search.proquest.com i-manager’s Journal on …. 0 cites.
  830. AUTHENTICATION OF DECENTRALIZED ACCESS CONTROL OF DATA STORED IN CLOUD“. PG KRISHNA, UMA MAHESWARI. 0. ijiemr.org. 0 cites.
  831. Big data privacy-preserved public auditing for shared data in cloud“. G Mangalassery, DL Manilal. 0. ijettcs.org. 0 cites.
  832. Big data privacy-preserved public auditing for shared data in cloud“. G Mangalassery, DL Manilal. 0. ijettcs.org. 0 cites.
  833. Code-based signature schemes with special properties“. PL Cayrel. 0. . 0 cites.
  834. Community Auditing Cloud Partitioning for the Public Cloud“. P SAISWAPNA, M CHIRANJEEVI. 2015. ijitech.org . 0 cites.
  835. Confidentiality in Public Auditing for Shared Data in the Cloud“. GCR REDDY, DRGSV KUMAR. 2015. . 0 cites.
  836. CONFIRMATION OF DATA INTEGRITY CONCERNING SHARED DATA IN CLOUD PLATFORM“. L Jadi, B Uppalaiah. 0. ijares.com. 0 cites.
  837. Constructing Designated-Verifier Ring Signature and Ring Signcryption under the k-CCA2 Assumption“. F Xiao-tong, L Wen. 2012. ieeexplore.ieee.org Intelligent Networking and Collaborative …. 0 cites.
  838. Contributions on fair exchange of digital signatures“. Y Wang. 2014. ro.uow.edu.au . 0 cites.
  839. Contributions to privacy preserving with ring signatures“. YQ Chen. 2006. ro.uow.edu.au . 0 cites.
  840. Converting Cryptographic Schemes from Composite Order to Prime Order Pairing“. R Kabaleeshwaran, MPL Das, S Chatterjee. 0. ece.iisc.ernet.in. 0 cites.
  841. Cost-Effective Authentic & Anonymous Data Sharing with Forward Security“. R Nagar, DM Patil, DM Patil, CD Pagare. 0. ijream.org. 0 cites.
  842. Crypto-Book: Privacy Preserving Online Identities“. J Maheswaran, D Wolinsky, B Ford. 0. cs.yale.edu. 0 cites.
  843. Cryptographic protocols from declarative specifications“. M Backes, RM Reischuk. 2010. Proceedings of the Grande Region Security and …. 0 cites.
  844. CT-RSA 2006“. D Pointcheval. 0. Springer. 0 cites.
  845. Decentralized Access Control Scheme for Secure Data Storage in Clouds“. BK VENI, GV VANI. 2015. . 0 cites.
  846. Decentralized Privacy Preserving for Securing Data in Clouds“. P VidhyaLakshmi, C Premalatha, M RamyaRamPrasad. 0. ijreat.org. 0 cites.
  847. Deniable Ring Signatures“. E Reich. 2007. dspace.mit.edu . 0 cites.
  848. Design of New Linearly Homomorphic Signatures on Lattice“. R Choi, K Kim. 2017. pdfs.semanticscholar.org . 0 cites.
  849. Design the Efficiency Public Auditing Mechanism Using Identity Privacy and Traceability Concepts“. D Sharanya, KR Prasad, MM Bala. 0. ijarf.com. 0 cites.
  850. Designated verifier ring signature and ring signcryption“. X Fu, W Liu, R Shi. 2013. inderscienceonline.com International Journal of Intelligent …. 0 cites.
  851. Digital Signatures“. T Baigèneres, Y Lu, S Vaudenay, P Junod…. 2006. Springer A Classical Introduction …. 0 cites.
  852. Distributed System in Platform Security Using Mobile Agent“. B Sriprathha, S Muthukumaraswamy. 0. pdfs.semanticscholar.org. 0 cites.
  853. Dynamic privacy management for communications of clients in privacy-preserving groups“. ME Van Dijk, E Kolman, R Hodgman. 2017. Google Patents US Patent 9,660,813. 0 cites.
  854. Effective data sharing using advanced ring signature with forward security“. E Chandanapriya, G Murali. 2016. ieeexplore.ieee.org Communication and Electronics …. 0 cites.
  855. ENCRYPTION-BASED ACCESS CONTROL WITH EFFICIENT REVOCATION“. VJ Naik, M Eranna. 0. ijetcse.com. 0 cites.
  856. Enhanced Cloud Access Control Methodology for Preventing Leakage of Sensitive and Policy Information“. Q FATIMA, S JABEEN, S FARHA. 2015. . 0 cites.
  857. Enhancement of Generalized Ring Signatures with Convertibility“. SF Tzeng, SJ Horng. 2012. ieeexplore.ieee.org Biometrics and Security Technologies …. 0 cites.
  858. Erratum: Ring signatures for benzenoids with up to seven rings, Part 2: Pericondensed systems“. AT Balaban, M Randić. 2012. Wiley Online Library International Journal of Quantum …. 0 cites.
  859. Fair exchange signature schemes“. K KyungSup. 2010. cnki.com.cn Science. 0 cites.
  860. FORWARDED SECURE IDENTITY BASED RING SIGNATURE SCHEME WITH SEGMENTED CELLULAR AUTOMATA SCHEMES“. SN Saranya, P Thilagavathi, M Suguna. 0. ijcrcst.com. 0 cites.
  861. Generalized Anonymous Information Sharing“. J Ren, L Ham. 2007. ieeexplore.ieee.org … Processing Applications for Public Security and …. 0 cites.
  862. Group-oriented ring signature.“. C Ma, J Ao. 2011. eprint.iacr.org IACR Cryptology ePrint Archive. 0 cites.
  863. Hierarchical Ring Signatures Revisited–Unconditionally and Perfectly Anonymous Schnorr Version“. Ł Krzywiecki, M Sulkowska, F Zagórski. 2015. Springer International Conference on …. 0 cites.
  864. Homomorphic authenticable ring signature mechanism for Public Auditing on shared data in the Cloud“. MSGD Patwardhan, BW Balkhande. 0. ijecs.in. 0 cites.
  865. How to leak a secret from multiple sources“. J Reny, L Harnz, T Li. 2008. ieeexplore.ieee.org Military Communications Conference …. 0 cites.
  866. ID-Based Deniable Ring Signature With Constant-Size Signature And Its Extention“. C HU, P LIU. 2010. pdfs.semanticscholar.org Journal of Computational Information …. 0 cites.
  867. Identity Based Ring Signature“. SSMCRWC Lui, LCKHSM Yiu. 0. pdfs.semanticscholar.org. 0 cites.
  868. Identity Based Threshold Ring Signature from Lattices“. B Wei, Y Du, H Zhang, F Zhang, H Tian…. 2014. Springer … Conference on Network …. 0 cites.
  869. Identity-based ring signature scheme based on quadratic residuesfD“. X I’Iu, Q Zhiguang, L Fagen. 0. . 0 cites.
  870. Identity-Based Xtr Blind Signature Scheme“. Q Tang, F Shen. 2013. Taylor & Francis Intelligent Automation & Soft Computing. 0 cites.
  871. Identity-basedAuthentic and Anonymous Data Sharing with Forward Security“. S Mohan. 2016. ijircee.in Identity. 0 cites.
  872. IKS“. J Koch. 2015. . 0 cites.
  873. Implementación en Java de una librería para la creación de firma grupal apta para cloud collaboration“. J Arumí Pauls. 2016. upcommons.upc.edu . 0 cites.
  874. Implementing Data Protection using Homomorphic Authenticators and Ring Signatures in Clouds“. R GUMMADI, KJSRI HARSHA. 2015. . 0 cites.
  875. IMPROVED GENERALIZED RING SIGNATURES“. HYU CHIEN. 2014. ci.nii.ac.jp ICIC express letters. Part B, Applications: an …. 0 cites.
  876. Maintaining Integrity for Shared Data In Cloud With Ring Signatures“. N Nagamani, SS Ali. 2015. ijseat.com IJSEAT. 0 cites.
  877. Maintaining unlinkability in group based P2P environments“. JAMJ Herrera-Joancomartı. 0. in3.uoc.edu. 0 cites.
  878. Mesospheric airglow and ionospheric responses to upward-propagating acoustic and gravity waves above tropospheric sources“. JB Snively, MD Zettergren. 2013. adsabs.harvard.edu AGU Fall Meeting Abstracts. 0 cites.
  879. Modification of One Forward Secure Ring Signature Scheme Based on Bilinear Groups of Composite Order“. Z Cao, X Wu, H Cao. 2013. ieeexplore.ieee.org Cloud and Service Computing (CSC) …. 0 cites.
  880. Multivariate Public Key Cryptography-Based Proxy Ring Signature Scheme“. CY Sun, YF Li, XM Si. 2012. Journal of Information Engineering … Journal of …. 0 cites.
  881. New Construction of Constant-Size Identity-based Linkable Ring Signature“. F Wang, Y Zheng. 2013. Advanced Institutes of Convergence … Journal of Convergence …. 0 cites.
  882. New Convertible Ring Signatures Based on RSA“. K Huang, R Tso. 0. nccur.lib.nccu.edu.tw. 0 cites.
  883. Nominative Proxy Ring Signature“. C Hu, P Liu, G Zhang. 2009. ieeexplore.ieee.org … Computing, 2009. SNPD’09. 10th ACIS …. 0 cites.
  884. On the definition of anonymity for ring signatures“. M Ohkubo, M Abe. 2006. Springer Lecture notes in computer science. 0 cites.
  885. ON THE SECURITY OF TWO RING SIGNCRYPTION SCHEMES“. P Rangan. 0. pdfs.semanticscholar.org. 0 cites.
  886. Optical pattern recognition by diffraction pattern sampling“. HL Kasdan. 1979. proceedings.spiedigitallibrary.org Society of Photo-Optical …. 0 cites.
  887. Optimal Data Sharing with Forward Security“. DV Shinde, BM Patil. 2016. pdfs.semanticscholar.org International Journal of Computer …. 0 cites.
  888. Optimizing ring signature keys for e-voting“. JL Tornos, JL Salazar, JJ Piles. 2015. ieeexplore.ieee.org Wireless Communications and …. 0 cites.
  889. ORUTA: Enabling Security and Public Batch Auditing for Distributed Data in the Cloud“. PV PRIYA, A HARITHA. 2015. . 0 cites.
  890. ORUTA: Enabling Security and Public Batch Auditing for Distributed Data in the Cloud“. PV PRIYA, A HARITHA. 2015. . 0 cites.
  891. Oruta: Public Auditing for Shared Data in the Cloud Storage“. MMB Patil, MNA Kumar. 2014. irjcs.com . 0 cites.
  892. Paleoflood records from anatomical tree-ring signatures“. S St George, E Nielsen. 2003. adsabs.harvard.edu AGU Fall Meeting Abstracts. 0 cites.
  893. Poster: Towards Blockchain Transaction Privacy“. M Di Ferrante, R Mercer. 0. clearmatics.com. 0 cites.
  894. PPAKBS: Privacy-Preserving Public Auditing for Key generation Based Cloud Storage using Batch Signature“. N Keerthika. 0. ijmcs.info. 0 cites.
  895. Price Negotiation Systems for M-commerce“. Z Huafei, B Feng…. 2007. ieeexplore.ieee.org … , 2007. ICC’07. IEEE …. 0 cites.
  896. Privacy Enhancing Technologies“. LD Nguyen. 2005. . 0 cites.
  897. Privacy on the Blockchain: Unique Ring Signatures“. R Mercer. 2016. arxiv.org arXiv preprint arXiv:1612.01188. 0 cites.
  898. Privacy Preserved Data Auditing For Clouds“. RDA Sudha. 0. techscripts.org. 0 cites.
  899. Privacy Preserving and Effective User Revocation on Dynamic Groups using CP-ABE Scheme“. MS Kumari, K Santhi, BT Rao. 0. Citeseer. 0 cites.
  900. PRIVACY PRESERVING THROUGH RING SIGNATURE METHOD“. HR MANJUNATH. 2015. israse.com . 0 cites.
  901. Privacy-Preserving Public Auditing for Shared Data in the Cloud“. CM Jadhav, MSD Shabade. 0. ijecs.in. 0 cites.
  902. Privacy-Preserving Public Auditing using Ring Signatures for Secure Cloud Storage“. S Bhagyashri, YB Gurav. 0. . 0 cites.
  903. Privacy-Retaining Public Analyzing for Shared Data in the Cloud“. MR Patil, S Dharavath. 2015. ijarcsms.com . 0 cites.
  904. Projecte de tesi“. JH Sotoca. 0. . 0 cites.
  905. Protection of Shared Data using Auditing in Public Cloud“. N GOPI, R REVATHI, NS SUHASINI. 2016. ijatir.org . 0 cites.
  906. Proving Computational Soundness of the Applied Pi-Calculus without Using Computable Parsing“. H Comon-Lundh, M Hagiya, Y Kawamoto, H Sakurada. 0. cs.bham.ac.uk. 0 cites.
  907. Public Key Cryptography–PKC 2007“. TOX Wang. 2007. Springer . 0 cites.
  908. Public Key Infrastructure: Second European PKI Workshop: Research and Applications, EuroPKI 2005, Canterbury, UK, June 30-July 1, 2005, Revised …“. D Chadwick, G Zhao. 2005. books.google.com . 0 cites.
  909. Record Maintenance and Secure Preserving Of Shared Data in Public Auditing“. M Rafeeq. 2015. Research Trend International Journal on Emerging Technologies. 0 cites.
  910. Regulating the Deep Web Through Controlled BlockChains and Crypto-Currency Networks“. K Hegadekatti. 2016. papers.ssrn.com . 0 cites.
  911. RELIABLE AND SECURE DATA SHARING WITH FORWARD SECURITY IN CLOUD ENVIRONMENTS“. K Sekhar, M Anand. 0. ijtre.com. 0 cites.
  912. Remote Data Auditing Scheme in Secured Cloud Storage Environment“. PG Scholar. 0. . 0 cites.
  913. Research on Electronic Cash Security Technology in Electronic Commerce“. SJ Gong, LD Jin. 2014. Trans Tech Publ Advanced Materials Research. 0 cites.
  914. Research on Strongly Unforgeable Ring Signature Scheme Based on ID“. G Zeng. 0. pdfs.semanticscholar.org. 0 cites.
  915. Review on Forward Secure Identity based Ring Signature for Data Sharing in the Cloud“. P Rumao, S Pundkar. 2016. search.proquest.com International Journal of Computer …. 0 cites.
  916. Revisiting optimistic fair exchange based on ring signatures“. Y Wang, MHA Au, W Susilo. 2014. ieeexplore.ieee.org IEEE Transactions on Information …. 0 cites.
  917. Revisiting Optimistic Fair Exchange Based on Ring Signatures……………… Y. Wang, MHA Au, and W. Susilo 1883 A Pragmatic Per-Device Licensing …“. L Zhang, CH Chang, X Ma, J Zhang, J Tao, J Li, J Tian…. 0. ieeexplore.ieee.org. 0 cites.
  918. RING CT FOR MONERO“. SN MRL. 0. pdfs.semanticscholar.org. 0 cites.
  919. Ring signature scheme from multilinear maps in the standard model“. X Zhang, Z Liu, X Wang. 2015. ieeexplore.ieee.org P2P, Parallel, Grid, Cloud and …. 0 cites.
  920. Ring Signatures for Benzenoids With up to Seven Rings, Part 2: Pericondensed Systems (vol 108, pg 898, 2008)“. AT Balaban, M Randic. 2011. … , 350 MAIN ST, MALDEN 02148, MA … …. 0 cites.
  921. Ring Signatures of Constant Size Without Random Oracles“. F Tang, H Li. 2014. Springer International Conference on Information Security and …. 0 cites.
  922. Ring Signatures of Constant Size Without Random Oracles“. F Tang, H Li. 2014. Springer International Conference on Information Security and …. 0 cites.
  923. Ring Signatures with a Designated Receiver“. JS Lee, JH Chang. 0. Korean Institute of Information … Proceedings of the Korean …. 0 cites.
  924. RingRainbow–An Efficient Multivariate Ring Signature Scheme“. MSE Mohamed, A Petzoldt. 2017. Springer International Conference on Cryptology in …. 0 cites.
  925. Salvation of Information Exchange Over Cloud Service Provider by Predicate Based Algorithm and Finest Access Control by Attribute Based Signature“. NRKAP Narensingh, S Yadav. 0. academia.edu. 0 cites.
  926. Scalable Anonymous Authentication“. A Bergal, B Tidor, E Hsu, C Zuo. 0. courses.csail.mit.edu. 0 cites.
  927. SCRAM BASED SECURITY FOR DATA SHARING IN DYNAMIC CLOUD ENVIRONMENT“. B Gunalan, T Christoper. 0. ijeete.com. 0 cites.
  928. Security Analysis Concerning the Random Numbers of Threshold Ring Signatures“. K Huang, R Tso. 2012. ieeexplore.ieee.org Information Technology: New Generations …. 0 cites.
  929. Security Challenges for Public Cloud“. R Raghavendran, L Parthasarathi, N Deepa. 2015. pdfs.semanticscholar.org . 0 cites.
  930. Security Preserving Access Control Mechanism In Public Clouds Using PANDA Security Mechanism“. M Pingale, J Pingalkar. 0. spvryan.org. 0 cites.
  931. Some Thoughts on Strong Unforgeability in Ring Signature Schemes“. C Wang. 2012. Trans Tech Publ Advanced Materials Research. 0 cites.
  932. Special Issue on JITEL 2013 Best Papers“. JM Lopez-Soler. 2014. macrothink.org Network Protocols and Algorithms. 0 cites.
  933. Stealth Address, Ring Signatures, Monero“. NT Courtois. 0. nicolascourtois.com. 0 cites.
  934. Study of Secure Auditing Techniques with Efficient User revocation In Cloud“. MN Ravindran. 2017. imperialjournals.com Imperial Journal of Interdisciplinary Research. 0 cites.
  935. Superior Traceability Machine for Shared Data in the Cloud“. MRK Jayesh, SV Gumaste…. 2015. researchgate.net International Journal of …. 0 cites.
  936. Survey on Forward Security for Authentic and Anonymous Data Sharing with Auditing Integrity“. VA Gaikwad, SD Babar. 0. pdfs.semanticscholar.org. 0 cites.
  937. Switch Commitments: A Safety Switch for Confidential Transactions.“. T Ruffing, G Malavolta. 2017. eprint.iacr.org IACR Cryptology ePrint Archive. 0 cites.
  938. Teleport: anonymity through off-blockchain transaction information transfer A Dark Paper for BTCD“. CJ Lee. 0. . 0 cites.
  939. The extracts below are taken from the BCS’s eminent academic monthly, The Computer Journal, published with Oxford University Press.“. I Awan. 2013. academic.oup.com ITNow. 0 cites.
  940. Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006: Proceedings“. S Halevi. 2006. books.google.com . 0 cites.
  941. This paper provides either security proofs or attacks for a large number of identity-based identification and signature schemes defined either explicitly or implicitly in …“. R Impagliazzo, R Jaiswal, V Kabanets. 2009. infona.pl Journal of Cryptology. 0 cites.
  942. Threshold Ring Signatures for Ad-hoc CroupsG“. E Bressonh, J Sternh, M Szydlo. 0. di.ens.fr. 0 cites.
  943. Threshold Ring Signatures in the Random Oracle Model“. 一色寿幸, 田中圭介, 東京工業大学数理…. 2004. kurims.kyoto-u.ac.jp 数理解析研究所 …. 0 cites.
  944. Threshold Ring Signatures in the Random Oracle Model (Evolutionary Advancement in Fundamental Theories of Computer Science)“. T Isshiki, K Tanaka. 2004. repository.kulib.kyoto-u.ac.jp . 0 cites.
  945. Time and frequency domain measurements for plutonium metal rings“. JT Mihalczo, VK Pare, ED Blakeman, TE Valentine…. 1996. osti.gov . 0 cites.
  946. Toward Unlinkable Bitcoin Transactions“. A Poelstra, G Maxwell. 0. download.wpsoftware.net. 0 cites.
  947. Traceability Mechanism for Sharing Data in Cloud“. KJ Rasal, SA Kahate. 2015. search.proquest.com International Journal of Science …. 0 cites.
  948. Track 1-Parallel Algorithms-Efficient Linkable Ring Signatures and Threshold Signatures from Linear Feedback Shift Register“. X Li, D Zheng, K Chen. 2007. Berlin: Springer-Verlag, 1973- Lecture Notes in Computer …. 0 cites.
  949. Tree-ring signatures and weather anomalies.(Oak stand Guttenberger Forest, weather station Wuerzburg).“. B Becker, R Glaser. 1991. agris.fao.org Forstwissenschaftliches Centralblatt. 0 cites.
  950. Two ID-Based Analogous Ring Signature Schemes“. ZJHW Ji-Lin, W Yu-Min. 2005. journal.ucas.ac.cn 中 国科学院 研究生院 学报. 0 cites.
  951. Unconditionally Anonymous Controllable ID-Based Ring Signatures“. PK Thandra, J Rajan…. 2015. Taylor & Francis Journal of Discrete …. 0 cites.
  952. Unconditionally Anonymous Ring and Mesh Signatures“. X Boyen. 2016. Springer Journal of Cryptology. 0 cites.
  953. Universal Forgery on Shen et al.’s Linkable and Convertible ID-based Ring Signature Scheme.“. SJ Hwang. 2014. tkuir.lib.tku.edu.tw ICS. 0 cites.
  954. Unlinkable and Strongly Accountable Sanitizable Signatures from Verifiable Ring Signatures⋆“. X Bultel, P Lafourcade. 0. eprint.iacr.org. 0 cites.
  955. Usage of Ring Signatures To Develop Homomorphic Authenticators In Oruta To Confirm The Uprightness Of Shared Information“. B Sneha, GS Suneetha, KC Sekhar. 2015. ijrcct.org IJRCCT. 0 cites.
  956. Utilization Of Ring Signatures To Construct Homomorphic Authenticators In ORUTA To Verify The Integrity of Shared Data“. GMP Reddy, KC Pradeep. 2016. ijseat.com IJSEAT. 0 cites.
  957. What is the SSN proxy good for?“. HS Hudson, BT Welsch. 2013. adsabs.harvard.edu AGU Fall Meeting Abstracts. 0 cites.
  958. Кільцеві підписи та їх властивості“. ДВ Шевченко. 2007. irbis-nbuv.gov.ua Радіоелектронні і комп’ютерні системи. 0 cites.
  959. 지정된 수신자를 갖는 환 서명“. 이지선, 장직현. 2006. 한국정보과학회 학술발표논문집. 0 cites.
  960. 一种基于 q-SDH 假设的选择关联环签名方案 Selectively Linkable Ring Signature Scheme Based on the q-SDH Assumption“. 李伟, 唐明伟, 范明钰. 2012. scgx.cbpt.cnki.net 西华大学学报 (自然科学版). 0 cites.
  961. 两种基于 ID 的类环签名方案“. 张键红, 王继林, 王育民. 2005. journal.ucas.ac.cn 中国科学院大学学报. 0 cites.
  962. 並存簽章——安全性概念, 分析, 與建構議題“. H Huang. 2008. ir.lib.ncu.edu.tw . 0 cites.
  963. 並存簽章——安全性概念, 分析, 與建構議題; Concurrent Signatures: Security Notions, Analysis, and Construction Issues“. 黃煥中. 2008. ir.lib.ncu.edu.tw . 0 cites.
  964. 保護行動代理人所收集資料之研究; The Research of Mobile Agent Collected Data Protection“. 陳和樞. 2004. ir.lib.ncu.edu.tw . 0 cites.
  965. 具可調整性之環簽章“. 陳子鍾. 2009. airitilibrary.com 亞洲大學會計與資訊學系學位論文. 0 cites.
  966. 具強指定驗證者的匿名環簽章“. KL Cheng. 2009. airitilibrary.com 淡江大學資訊工程學系碩士班學位論文. 0 cites.
  967. 具最佳簽章者匿名性的有效指定驗證者之環簽章法“. JY Chen. 2010. airitilibrary.com 淡江大學資訊工程學系碩士班學位論文. 0 cites.
  968. 具有強指定驗證者匿名性的環簽章法“. CF Chuang. 2015. airitilibrary.com 淡江大學資訊工程學系碩士班學位論文. 0 cites.
  969. 可指定驗証者的異質群體導向簽章系統“. 茆育成. 2001. ir.nctu.edu.tw . 0 cites.
  970. 标准模型下条件匿名的环签名方案“. 曾晟珂, 秦志光, 陆庆. 2012. . 0 cites.
  971. 環狀公開金鑰密碼系統“. 張智超. 2005. ir.lib.ncku.edu.tw . 0 cites.
  972. 環簽章可識別性之研究“. 劉又銓. 2005. airitilibrary.com 成功大學資訊工程學系學位論文. 0 cites.
  973. 适用于电子现金协议的简短关联环签名方案“. 王玲玲, 张国印, 马春光. 2008. 118.145.16.222 北京邮电大学学报. 0 cites.
  974. 适用于电子现金协议的简短关联环签名方案 A Short Linkable Ring Signature Scheme for E-Cash Protocol“. 王玲玲, 张国印, 马春光. 2008. 北京邮电大学学报. 0 cites.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.