DC Field | Value | Language |
---|---|---|
dc.contributor.author | Li, J. | - |
dc.contributor.author | Yuen, T.H. | - |
dc.contributor.author | Kim, Kwangjo | - |
dc.date.accessioned | 2009-12-29T09:12:38Z | - |
dc.date.available | 2009-12-29T09:12:38Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2007 | - |
dc.identifier.citation | 1st International Conference on Provable Security 2007, ProvSec 2007, v.4784, no., pp.198 - 207 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10203/16059 | - |
dc.language | ENG | - |
dc.language.iso | en_US | en |
dc.title | Practical threshold signatures without random oracles | - |
dc.type | Conference | - |
dc.identifier.scopusid | 2-s2.0-38149090152 | - |
dc.type.rims | CONF | - |
dc.citation.volume | 4784 | - |
dc.citation.beginningpage | 198 | - |
dc.citation.endingpage | 207 | - |
dc.citation.publicationname | 1st International Conference on Provable Security 2007, ProvSec 2007 | - |
dc.identifier.conferencecountry | Australia | - |
dc.identifier.conferencecountry | Australia | - |
dc.contributor.localauthor | Kim, Kwangjo | - |
dc.contributor.nonIdAuthor | Li, J. | - |
dc.contributor.nonIdAuthor | Yuen, T.H. | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.