Skip to main content
placeholder image

Identity-based chameleon hash scheme without key exposure

Journal Article


Abstract


UOW Authors


  •   Chen, Xiaofeng (external author)
  •   Zhang, Fangguo (external author)
  •   Susilo, Willy
  •   Tian, Haibo (external author)
  •   Li, Jin (external author)
  •   Kim, Kwangjo (external author)

Publication Date


  • 2010

Citation


  • Chen, X., Zhang, F., Susilo, W., Tian, H., Li, J. & Kim, K. (2010). Identity-based chameleon hash scheme without key exposure. P. Hawkes & R. Steinfeld In Information Security and Privacy: 15th Australasian Conference, ACISP 2010, 5-7 Jul, 2010, Sydney, Australia. Lecture Notes in Computer Science, 6168 200-215.

Scopus Eid


  • 2-s2.0-78649844945

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/3499

Has Global Citation Frequency


Number Of Pages


  • 15

Start Page


  • 200

End Page


  • 215

Volume


  • 6168

Place Of Publication


  • Germany

Abstract


UOW Authors


  •   Chen, Xiaofeng (external author)
  •   Zhang, Fangguo (external author)
  •   Susilo, Willy
  •   Tian, Haibo (external author)
  •   Li, Jin (external author)
  •   Kim, Kwangjo (external author)

Publication Date


  • 2010

Citation


  • Chen, X., Zhang, F., Susilo, W., Tian, H., Li, J. & Kim, K. (2010). Identity-based chameleon hash scheme without key exposure. P. Hawkes & R. Steinfeld In Information Security and Privacy: 15th Australasian Conference, ACISP 2010, 5-7 Jul, 2010, Sydney, Australia. Lecture Notes in Computer Science, 6168 200-215.

Scopus Eid


  • 2-s2.0-78649844945

Ro Metadata Url


  • http://ro.uow.edu.au/infopapers/3499

Has Global Citation Frequency


Number Of Pages


  • 15

Start Page


  • 200

End Page


  • 215

Volume


  • 6168

Place Of Publication


  • Germany