共 50 条
- [31] A provable secure fuzzy identity based signature scheme Science China Information Sciences, 2012, 55 : 2139 - 2148
- [32] A Secure Proxy Blind Signature Scheme Based on ECDLP MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 454 - 457
- [33] Secure vehicular communications based on group signature and ID-based signature scheme 2007 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-14, 2007, : 1539 - +
- [34] Secure group signature scheme Guofang Keji Daxue Xuebao/Journal of National University of Defense Technology, 2000, 22 (02): : 74 - 77
- [35] A forward-secure scheme based on secret sharing 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 4, 2008, : 1134 - 1138
- [36] Threshold Signature Scheme Based on Modular Secret Sharing 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 1003 - +
- [38] Limited proxy signature scheme based on elliptic curve Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2002, 24 (12): : 1825 - 1828
- [39] Forward-Secure Customizable Data Sharing in Blockchain-based EHR Systems 2023 20TH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PST, 2023, : 474 - 485
- [40] Secure Medical Image-Sharing Mechanism based on Visual Cryptography in EHR system 2018 20TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2018, : 463 - 467