A Practical Solution to the (<i>t</i>, <i>n</i>) Threshold Untraceable Signature with (<i>k</i>, <i>l</i>) Verification Scheme. Yang, J., Chang, C., & Wang, C. In Proceedings of Ubiquitous Intelligence and Computing (UIC), pages 998-1007, 2006.
A Practical Solution to the (<i>t</i>, <i>n</i>) Threshold Untraceable Signature with (<i>k</i>, <i>l</i>) Verification Scheme [link]Paper  bibtex   
@inproceedings{ dblp3613264,
  title = {A Practical Solution to the (<i>t</i>, <i>n</i>) Threshold Untraceable Signature with (<i>k</i>, <i>l</i>) Verification Scheme},
  author = {Jen-Ho Yang and Chin-Chen Chang and Chih-Hung Wang},
  author_short = {Yang, J. and Chang, C. and Wang, C.},
  bibtype = {inproceedings},
  type = {inproceedings},
  year = {2006},
  key = {dblp3613264},
  id = {dblp3613264},
  biburl = {http://www.dblp.org/rec/bibtex/conf/uic/YangCW06},
  url = {http://dx.doi.org/10.1007/11833529_101},
  conference = {UIC},
  pages = {998-1007},
  text = {UIC 2006:998-1007},
  booktitle = {Proceedings of Ubiquitous Intelligence and Computing (UIC)}
}
Downloads: 0