Cited By
View all- Anada HKawamoto JWeng JSakurai K(2014)Identity-Embedding Method for Decentralized Public-Key InfrastructureRevised Selected Papers of the 6th International Conference on Trusted Systems - Volume 947310.1007/978-3-319-27998-5_1(1-14)Online publication date: 16-Dec-2014
- Kiayias ATang QSadeghi AGligor VYung M(2013)How to keep a secretProceedings of the 2013 ACM SIGSAC conference on Computer & communications security10.1145/2508859.2516691(943-954)Online publication date: 4-Nov-2013
- Trolin M(2005)A universally composable scheme for electronic cashProceedings of the 6th international conference on Cryptology in India10.1007/11596219_28(347-360)Online publication date: 10-Dec-2005
- Show More Cited By
