共 50 条
- [23] Fail-stop threshold signature schemes based on elliptic curves [J]. INFORMATION SECURITY AND PRIVACY, 1999, 1587 : 103 - 116
- [24] Improvement on Lin et al's Strong Designated Verifier Proxy Signature Scheme for Electronic Commerce [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (05): : 333 - 347
- [25] Two Improved Proxy Multi-signature Schemes Based on the Elliptic Curve Cryptosystem [J]. 2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL I, 2010, : 423 - 426
- [26] Two Improved Proxy Multi-signature Schemes Based on the Elliptic Curve Cryptosystem [J]. COMPUTING AND INTELLIGENT SYSTEMS, PT IV, 2011, 234 : 101 - +
- [27] Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme [J]. INFORMATION SECURITY APPLICATIONS, 2009, 5379 : 115 - 129
- [30] Improvement of Hsu-Wu-He's proxy multi-signature schemes [J]. SECURE DATA MANAGEMENT, PROCEEDINGS, 2005, 3674 : 234 - 240