|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
EBSCO_ocn855019687 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cnu---unuuu |
008 |
130805t20132013nyua ob 001 0 eng d |
040 |
|
|
|a N$T
|b eng
|e rda
|e pn
|c N$T
|d OCLCA
|d E7B
|d FTU
|d YDXCP
|d OCLCF
|d OCLCO
|d EBLCP
|d OCLCQ
|d OCLCO
|d AGLDB
|d OCLCQ
|d VTS
|d CEF
|d AU@
|d OCLCQ
|d OCLCO
|d STF
|d M8D
|d OCLCQ
|d OCLCO
|d OCLCQ
|d OCLCO
|
020 |
|
|
|a 9781628080841
|q (electronic bk.)
|
020 |
|
|
|a 1628080841
|q (electronic bk.)
|
020 |
|
|
|z 9781628080834
|
020 |
|
|
|z 1628080833
|
029 |
1 |
|
|a AU@
|b 000062327404
|
029 |
1 |
|
|a CHNEW
|b 000633892
|
029 |
1 |
|
|a DEBBG
|b BV041637176
|
029 |
1 |
|
|a DEBBG
|b BV043037860
|
029 |
1 |
|
|a DEBSZ
|b 429951019
|
029 |
1 |
|
|a NZ1
|b 15194918
|
035 |
|
|
|a (OCoLC)855019687
|
050 |
|
4 |
|a QA76.9.A25
|b Q86 2013
|
072 |
|
7 |
|a COM
|x 083000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8/2
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Qin, Zhiguang,
|e author
|4 aut
|
245 |
1 |
0 |
|a Ad hoc anonymous signatures :
|b state of the art, challenges and new directions /
|c Zhiguang Qin, Hu Xiong and Guobin Zhu (University of Electronic Science and Technology of China, School of Computer Science and Engineering, Chengdu, Sichuan, China).
|
264 |
|
1 |
|a New York :
|b Nova Science Publishers, Inc.,
|c [2013]
|
264 |
|
4 |
|c Ã2013
|
300 |
|
|
|a 1 online resource (vi, 162 pages) :
|b illustration.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Cryptography, Steganography, and Data Security
|
504 |
|
|
|a Includes bibliographical references (pages 143-158) and index.
|
505 |
0 |
|
|a Introduction. Historical development of ring signature. Comparison between group signature and ring signature. Our contribution -- Formal definition and security model for ring signature. Formal definition of ring signature. Security model for ring signature. Forking lemma of the ring signature -- Ring signature schemes. Ring signature schemes in the traditional PKI. ID-based ring signature schemes. Certificateless ring signature schemes. Security and efficiency comparison -- Extensions of ring signature. Threshold ring signature. Revocable ring signature. Key-insulated ring signature. Forward secure ring signature. Ring signcryption. Proxy ring signature. Linkable ring signature. Concurrent signature. Deniable ring authentication -- Applications of ring signature. Privacy-preserving protocol for VANETs. Electronic auction. Distributed access control in WSN -- Conclusion.
|
588 |
0 |
|
|a Print version record and online resource; title from PDF title page (EBSCOhost eBook Collection, viewed October 23, 2013).
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Group signatures (Computer security)
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x Cryptography.
|2 bisacsh
|
650 |
|
7 |
|a Group signatures (Computer security)
|2 fast
|
700 |
1 |
|
|a Xiong, Hu,
|e author
|4 aut
|
700 |
1 |
|
|a Zhu, Guobin,
|d 1981-
|e author.
|4 aut
|
776 |
0 |
8 |
|i Print version:
|t Ad hoc anonymous signatures.
|d Hauppauge, New York : Nova Science Publishers, Inc., [2013]
|z 9781628080834
|w (DLC) 2013018502
|w (OCoLC)847985661
|
830 |
|
0 |
|a Cryptography, steganography and data security.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=621679
|z Texto completo
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL3022948
|
938 |
|
|
|a ebrary
|b EBRY
|n ebr10742757
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 621679
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 10794492
|
994 |
|
|
|a 92
|b IZTAP
|