共 50 条
- [41] Security Analysis of a Paillier-based Threshold Proxy Signature Scheme 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 683 - 687
- [42] Analysis and Correction on a Nonrepudiable Threshold Proxy Signature Scheme with Known Signers 2011 INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION AND INFORMATION TECHNOLOGY (ICCCIT 2011), 2011, : 176 - 179
- [43] Analysis and Improvement of a Threshold Signature Scheme Based on the General Access Structure CEIS 2011, 2011, 15
- [44] Security analysis and improvement of a (t, n) threshold proxy signature scheme SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 3, PROCEEDINGS, 2007, : 923 - +
- [46] Security Analysis of Liu-Li Digital Signature Scheme COMMUNICATION AND NETWORKING, PT II, 2010, 120 : 63 - +
- [47] Threshold proxy quantum signature scheme with threshold shared verification Science in China Series G: Physics, Mechanics and Astronomy, 2008, 51 : 1079 - 1088
- [49] Threshold proxy quantum signature scheme with threshold shared verification SCIENCE IN CHINA SERIES G-PHYSICS MECHANICS & ASTRONOMY, 2008, 51 (08): : 1079 - 1088
- [50] A Threshold Blind Digital Signature Scheme Using Elliptic Curve Dlog-Based Cryptosystem 2015 IEEE 81ST VEHICULAR TECHNOLOGY CONFERENCE (VTC SPRING), 2015,