共 50 条
- [41] Attack and improvement of a proxy signature scheme [J]. Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 40 (04): : 616 - 619
- [42] Insider attack on threshold multi-proxy multi-signature scheme [J]. J. Comput. Inf. Syst., 2009, 5 (1375-1380):
- [44] Improvement of a threshold proxy signature scheme [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2002, 39 (11):
- [45] A SECURE THRESHOLD PROXY SIGNATURE SCHEME [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2012, 18 (06): : 617 - 625
- [46] Undeniable Threshold Proxy Signature Scheme [J]. 2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 150 - 153
- [49] Improvement of a threshold proxy signature scheme [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3168 - 3172
- [50] Improvement of threshold proxy signature scheme [J]. Applied Mathematics and Computation (New York), 2003, 136 (2-3): : 315 - 321