共 50 条
- [1] A Strong Designated-verifier Proxy Signature scheme WKDD: 2009 SECOND INTERNATIONAL WORKSHOP ON KNOWLEDGE DISCOVERY AND DATA MINING, PROCEEDINGS, 2009, : 569 - 572
- [2] On the Security of a Designated-Verifier Proxy Signature Scheme and Its Improved Scheme (revisited) 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2196 - 2199
- [3] New Certificateless Designated-verifier Proxy Signature Scheme INTERNATIONAL CONFERENCE OF CHINA COMMUNICATION (ICCC2010), 2010, : 585 - 588
- [4] Designated-verifier chameleon proxy signature INTERNATIONAL SYMPOSIUM ON ADVANCES IN COMPUTER AND SENSOR NETWORKS AND SYSTEMS, PROCEEDINGS: IN CELEBRATION OF 60TH BIRTHDAY OF PROF. S. SITHARAMA IYENGAR FOR HIS CONTRIBUTIONS TO THE SCIENCE OF COMPUTING, 2008, : 554 - 561
- [5] Designated-verifier proxy signature schemes Security and Privacy in the Age of Ubiquitous Computing, 2005, 181 : 409 - 423
- [6] Designated-Verifier Chameleon Proxy Signature INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2009, 5 (01): : 29 - 29
- [7] Designated-verifier proxy signature schemes Wang, Guilin (glwang@iZr.a-star.edtsg), 1600, (Springer Science and Business Media, LLC):
- [8] Cryptanalysis and Improvement of a Strong Designated-verifier Proxy Signature scheme ADVANCED DESIGN AND MANUFACTURING TECHNOLOGY III, PTS 1-4, 2013, 397-400 : 1999 - 2003
- [9] An ID-Based Designated-Verifier Proxy Multi-Signature Scheme 2012 FOURTH INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY (MINES 2012), 2012, : 576 - 579
- [10] Designated verifier proxy signature scheme 2008 FOURTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PROCEEDINGS, 2008, : 235 - 238