Author of the publication

Improvement of the Miyazaki-Takaragi threshold digital signature scheme.

, , , and . Inf. Process. Lett., 88 (4): 183-186 (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Threshold Convertible Authenticated Encryption Scheme for Hierarchical Organizations., , , and . FGIT-FGCN (1), volume 119 of Communications in Computer and Information Science, page 23-36. Springer, (2010)Design and Development a Social Networks Platform for Older People., , , and . HCI (6), volume 6766 of Lecture Notes in Computer Science, page 186-195. Springer, (2011)The effect of community identity on continuance intention of microblogging., and . IJEB, 10 (4): 355-382 (2013)A Novel Identity-Based Key-Insulated Convertible Authenticated Encryption Scheme., and . Int. J. Found. Comput. Sci., 22 (3): 739-756 (2011)The financial crisis research: a bibliometric analysis., and . Scientometrics, 105 (1): 161-177 (2015)A novel user identification scheme with key distribution preserving user anonymity for distributed computer networks., and . Inf. Sci., 179 (4): 422-429 (2009)Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack., and . Applied Mathematics and Computation, 168 (1): 305-319 (2005)Efficient proxy signature schemes using self-certified public keys., and . Applied Mathematics and Computation, 152 (3): 807-820 (2004)Improvement of the Miyazaki-Takaragi threshold digital signature scheme., , , and . Inf. Process. Lett., 88 (4): 183-186 (2003)Recursive protocol for group-oriented authentication with key distribution., , , and . Journal of Systems and Software, 81 (7): 1227-1239 (2008)