共 50 条
- [43] Analysis of an ID-based Proxy Signature Scheme Without Trusted PKG and a Proxy Blind Multi-signature Scheme [J]. 2014 15TH IEEE/ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING (SNPD), 2014, : 167 - 170
- [44] An efficient ID-based multi-proxy multi-signature scheme [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 81 - +
- [45] A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2004, 20 (05): : 887 - 893
- [46] An Anonymous Proxy Multi-signature with Accountablility [J]. E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2014, 2015, 554 : 234 - 254
- [47] Improvement of multi-proxy signature scheme [J]. FOURTH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2004, : 450 - 455
- [48] Identity based proxy multi-signature [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2007, 80 (07) : 1023 - 1029
- [49] A new multi-proxy multi-signature scheme based on elliptic curve cryptography [J]. 2017 4TH NAFOSTED CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2017, : 105 - 109