A Practical Solution to the (<i>t</i>, <i>n</i>) Threshold Untraceable Signature with (<i>k</i>, <i>l</i>) Verification Scheme. Yang, J., Chang, C., & Wang, C. In Proceedings of Ubiquitous Intelligence and Computing (UIC), pages 998-1007, 2006.
Paper bibtex @inproceedings{ dblp3613264,
title = {A Practical Solution to the (<i>t</i>, <i>n</i>) Threshold Untraceable Signature with (<i>k</i>, <i>l</i>) Verification Scheme},
author = {Jen-Ho Yang and Chin-Chen Chang and Chih-Hung Wang},
author_short = {Yang, J. and Chang, C. and Wang, C.},
bibtype = {inproceedings},
type = {inproceedings},
year = {2006},
key = {dblp3613264},
id = {dblp3613264},
biburl = {http://www.dblp.org/rec/bibtex/conf/uic/YangCW06},
url = {http://dx.doi.org/10.1007/11833529_101},
conference = {UIC},
pages = {998-1007},
text = {UIC 2006:998-1007},
booktitle = {Proceedings of Ubiquitous Intelligence and Computing (UIC)}
}
Downloads: 0
{"_id":"zyv4pzgQa5ij62ZPx","bibbaseid":"yang-chang-wang-apracticalsolutiontotheitiinithresholduntraceablesignaturewithikiiliverificationscheme-2006","downloads":0,"creationDate":"2015-10-07T21:59:23.147Z","title":"A Practical Solution to the (<i>t</i>, <i>n</i>) Threshold Untraceable Signature with (<i>k</i>, <i>l</i>) Verification Scheme","author_short":["Yang, J.","Chang, C.","Wang, C."],"year":2006,"bibtype":"inproceedings","biburl":"http://www.dblp.org/rec/bibtex/conf/uic/YangCW06","bibdata":{"title":"A Practical Solution to the (<i>t</i>, <i>n</i>) Threshold Untraceable Signature with (<i>k</i>, <i>l</i>) Verification Scheme","author":["Jen-Ho Yang","Chin-Chen Chang","Chih-Hung Wang"],"author_short":["Yang, J.","Chang, C.","Wang, C."],"bibtype":"inproceedings","type":"inproceedings","year":"2006","key":"dblp3613264","id":"dblp3613264","biburl":"http://www.dblp.org/rec/bibtex/conf/uic/YangCW06","url":"http://dx.doi.org/10.1007/11833529_101","conference":"UIC","pages":"998-1007","text":"UIC 2006:998-1007","booktitle":"Proceedings of Ubiquitous Intelligence and Computing (UIC)","bibtex":"@inproceedings{ dblp3613264,\n title = {A Practical Solution to the (<i>t</i>, <i>n</i>) Threshold Untraceable Signature with (<i>k</i>, <i>l</i>) Verification Scheme},\n author = {Jen-Ho Yang and Chin-Chen Chang and Chih-Hung Wang},\n author_short = {Yang, J. and Chang, C. and Wang, C.},\n bibtype = {inproceedings},\n type = {inproceedings},\n year = {2006},\n key = {dblp3613264},\n id = {dblp3613264},\n biburl = {http://www.dblp.org/rec/bibtex/conf/uic/YangCW06},\n url = {http://dx.doi.org/10.1007/11833529_101},\n conference = {UIC},\n pages = {998-1007},\n text = {UIC 2006:998-1007},\n booktitle = {Proceedings of Ubiquitous Intelligence and Computing (UIC)}\n}","bibbaseid":"yang-chang-wang-apracticalsolutiontotheitiinithresholduntraceablesignaturewithikiiliverificationscheme-2006","role":"author","urls":{"Paper":"http://dx.doi.org/10.1007/11833529_101"},"downloads":0},"search_terms":["practical","solution","threshold","untraceable","signature","verification","scheme","yang","chang","wang"],"keywords":[],"authorIDs":["54768775cb4bf04e390012ee"],"dataSources":["sJ3MHF5NxNvTtPjAH"]}