共 50 条
- [21] The Analysis and Improvement of A Certificateless Threshold Proxy Blind Signature Scheme INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 494 - 501
- [22] Analysis and construction for threshold signature scheme based on game theory Tongxin Xuebao, 5
- [23] Security Analysis of One Quantum Digital Signature Scheme PROCEEDINGS OF THE 2009 SIXTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS, VOLS 1-3, 2009, : 1574 - 1576
- [24] Undeniable Threshold Proxy Signature Scheme 2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 150 - 153
- [25] A SECURE THRESHOLD PROXY SIGNATURE SCHEME INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2012, 18 (06): : 617 - 625
- [26] Threshold Signature Scheme with Subliminal Channel CCDC 2009: 21ST CHINESE CONTROL AND DECISION CONFERENCE, VOLS 1-6, PROCEEDINGS, 2009, : 1443 - 1447
- [27] An efficient threshold group signature scheme IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 338 - +
- [29] An efficient threshold group signature scheme TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : B13 - B16