Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
Browse
Publications
Preprints
About
About UCL Open: Env.
Aims and Scope
Editorial Board
Indexing
APCs
How to cite
Publishing policies
Editorial policy
Peer review policy
Equality, Diversity & Inclusion
About UCL Press
Contact us
For authors
Information for authors
How it works
Benefits of publishing with us
Submit
How to submit
Preparing your manuscript
Article types
Open Data
ORCID
APCs
Contributor agreement
For reviewers
Information for reviewers
Review process
How to peer review
Peer review policy
My ScienceOpen
Sign in
Register
Dashboard
Search
2
views
9
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,661
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Machine Learning for Cyber Security : 4th International Conference, ML4CS 2022, Guangzhou, China, December 2–4, 2022, Proceedings, Part II
A Certificateless-Based Blind Signature Scheme with Message Recovery
other
Author(s):
Xiao Li
,
Mengwen Wang
,
Fengyin Li
Publication date
(Online):
January 13 2023
Publisher:
Springer Nature Switzerland
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Value-based Healthcare
Most cited references
9
Record
: found
Abstract
: not found
Book Chapter
: not found
Identity-Based Cryptosystems and Signature Schemes
Adi Shamir
(1985)
0
comments
Cited
331
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
New directions in cryptography
W. Diffie
,
Chan Hellman
(1976)
0
comments
Cited
331
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Blind Signatures for Untraceable Payments
David Chaum
(1983)
0
comments
Cited
152
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2023
Publication date (Online):
January 13 2023
Pages
: 382-389
DOI:
10.1007/978-3-031-20099-1_32
SO-VID:
f42d03fd-ae43-491c-a6b4-2b1fbb2c2ba1
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
AMAD: Improving Adversarial Robustness Without Reducing Accuracy
pp. 15
Multi-party Secure Comparison of Strings Based on Outsourced Computation
pp. 31
Highway: A Super Pipelined Parallel BFT Consensus Algorithm for Permissioned Blockchain
pp. 39
Overview of DDoS Attack Research Under SDN
pp. 54
A Medical Image Segmentation Method Based on Residual Network and Channel Attention Mechanism
pp. 61
Performance Improvement of Classification Model Based on Adversarial Sample Generation
pp. 75
Research on Detection Method of Large-Scale Network Internal Attack Based on Machine Learning
pp. 89
Federated Community Detection in Social Networks
pp. 104
A Textual Adversarial Attack Scheme for Domain-Specific Models
pp. 118
An Improved Conv-LSTM Method for Gear Fault Detection
pp. 130
Extracting Random Secret Key Scheme for One-Time Pad Under Intelligent Connected Vehicle
pp. 144
Semi-supervised Learning with Nearest-Neighbor Label and Consistency Regularization
pp. 155
Bipolar Picture Fuzzy Graph Based Multiple Attribute Decision Making Approach–Part I
pp. 165
Priv-IDS: A Privacy Protection and Intrusion Detection Framework for In-Vehicle Network
pp. 180
Dynamic Momentum for Deep Learning with Differential Privacy
pp. 191
An Unsupervised Surface Anomaly Detection Method Based on Attention and ASPP
pp. 202
PCB Defect Detection Method Based on Improved RetinaNet
pp. 214
A Method of Protecting Sensitive Information in Intangible Cultural Heritage Communication Network Based on Machine Learning
pp. 228
Decision Making Analysis of Traffic Accidents on Mountain Roads in Yunnan Province
pp. 238
Deep Adaptively Feature Extracting Network for Cervical Squamous Lesion Cell Detection
pp. 254
DSGRAE: Deep Sparse Graph Regularized Autoencoder for Anomaly Detection
pp. 266
A Lattice-Based Aggregate Signature Based on Revocable Identity
pp. 275
Research and Design of an Emergency Supply Assurance Monitoring System in the Post-epidemic Context
pp. 283
Face Presentation Attack Detection Based on Texture Gradient Enhancement and Multi-scale Fusion
pp. 299
Optimal Revenue Analysis of the Stubborn Mining Based on Markov Decision Process
pp. 309
Bipolar Picture Fuzzy Graph Based Multiple Attribute Decision Making Approach-Part II
pp. 321
Machine Learning Based Method for Quantifying the Security Situation of Wireless Data Networks
pp. 335
Overlapping Community Discovery Algorithm Based on Three-Level Neighbor Node Influence
pp. 345
Content-Aware Deep Feature Matching
pp. 355
F2DLNet: A Face Forgery Detection and Localization Network Based on SSIM Error Maps
pp. 370
An Eye-Gaze Tracking Method Based on a 3D Ocular Surface Fitting Model
pp. 382
A Certificateless-Based Blind Signature Scheme with Message Recovery
pp. 390
Fault Detection of Rolling Bearings by Using a Combination Network Model
pp. 400
zkChain: An Efficient Blockchain Privacy Protection Scheme Based on zk-SNARKs
pp. 411
Research on Influential Factors of Online Learning Behavior Based on Big Data
pp. 422
Short Speech Key Generation Technology Based on Deep Learning
pp. 436
Domain Adversarial Interaction Network for Cross-Domain Fault Diagnosis
pp. 447
A Vehicle Data Publishing System with Privacy-Awares in VANETs Based on Blockchain
pp. 455
Highsimb: A Concrete Blockchain High Simulation with Contract Vulnerability Detection for Ethereum and Hyperledger Fabric
pp. 469
Research on Key Technologies for the Trusted Perception of Network Information for Big Data
pp. 479
Micro-expression Recognition Method Combining Dual-Stream Convolution and Capsule Network
pp. 495
Security Scheduling Method of Cloud Network Big Data Cluster Based on Association Rule Algorithm
pp. 510
Towards Differentially Private Contrastive Learning
pp. 521
Two-Stage High Precision Membership Inference Attack
pp. 536
Secure Storage Method for Network Resources of Professional Works Based on Decision Tree Algorithm
pp. 550
Vehicle CAN Network Intrusion Detection Model Based on Extreme Learning Machine and Feature Analysis
pp. 565
A Broad Learning System Based on the Idea of Vertical Federated Learning
pp. 575
PAMP: A New Atomic Multi-Path Payments Method with Higher Routing Efficiency
pp. 584
Privacy-Preserving Searchable Encryption Scheme Based on Deep Structured Semantic Model over Cloud Application
pp. 609
A Event Extraction Method of Document-Level Based on the Self-attention Mechanism
Similar content
2,661
Block-CLAP: Blockchain-Assisted Certificateless Key Agreement Protocol for Internet of Vehicles in Smart Transportation
Authors:
Durbadal Chattaraj
,
Basudeb Bera
,
Ashok Das
…
PCAS: Cryptanalysis and improvement of pairing-free certificateless aggregate signature scheme with conditional privacy-preserving for VANETs
Authors:
Ziyan Gong
,
Tianhan Gao
,
Nan Guo
Efficient certificateless strong designated verifier signature scheme
Authors:
B. Yang
,
Z HU
,
Z Xiao
See all similar