共 50 条
- [21] Security analysis of choi et al.'s certificateless short signature scheme [J]. Journal of Information Hiding and Multimedia Signal Processing, 2013, 4 (03): : 147 - 154
- [22] Comments on the security flaw of hwang et al.'s blind signature scheme [J]. Int. J. Netw. Secur., 2008, 2 (185-189):
- [24] Improvement of a threshold proxy signature scheme [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2002, 39 (11):
- [28] Improvement of a threshold proxy signature scheme [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3168 - 3172
- [29] Improvement of threshold proxy signature scheme [J]. Applied Mathematics and Computation (New York), 2003, 136 (2-3): : 315 - 321
- [30] Improvement of a new proxy signature scheme [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2008, 30 (01): : 245 - 248