Group Authentication Using The Naccache-Stern Public-Key Cryptosystem
Group Signature Schemes Using Braid Groups
Groups from Cyclic Infrastructures and Pohlig-Hellman in Certain Infrastructures
GSM Security Using Identity-based Cryptography
Guaranteeing the diversity of number generators