共 50 条
- [31] Nonrepudiable threshold proxy signature scheme based on elliptic curve cryptography [J]. Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2007, 42 (01): : 8 - 12
- [32] New self certified proxy digital signature scheme based on elliptic curve cryptosystem [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 723 - 726
- [33] Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem [J]. VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3240 - 3243
- [34] A SECURE AND EFFICIENT AUTHENTICATION WITH KEY AGREEMENT SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM [J]. ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2015, (34): : 101 - 112
- [35] Dynamic user authentication scheme based on the generalized elliptic curve signature scheme [J]. Xi Tong Cheng Yu Dian Zi Ji Shu/Syst Eng Electron, 2006, 10 (1569-1571):
- [36] An efficient threshold group signature scheme [J]. IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 338 - +
- [37] User authentication scheme based on elliptic curve cryptosystem [J]. Jisuanji Gongcheng/Computer Engineering, 2001, 27 (02):
- [38] An efficient threshold group signature scheme [J]. TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : B13 - B16
- [39] An efficient threshold group signature scheme [J]. APPLIED MATHEMATICS AND COMPUTATION, 2005, 167 (01) : 362 - 371
- [40] Digital signature scheme resulted from identification protocol by elliptic curve cryptosystem [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 192 - 195