共 50 条
- [1] A universal forgery on Araki et al.'s convertible limited verifier signature scheme [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (02): : 515 - 516
- [3] A novel ID-based threshold ring signature scheme competent for anonymity and anti-forgery [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1351 - 1354
- [4] A novel ID-based threshold ring signature scheme competent for anonymity and anti-forgery [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 502 - +
- [5] Security Issues of Chen et al.'s Dynamic ID-based Authentication Scheme [J]. 2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 125 - +
- [6] New Forgery Attack on Chang et al.'s signature scheme [J]. PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTER SCIENCE AND ELECTRONICS INFORMATION (ICACSEI 2013), 2013, 41 : 5 - 6
- [8] Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2012, 7154 : 141 - 152
- [9] Efficient ID-based Threshold Ring Signature scheme [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 437 - 442
- [10] An Efficient ID-based Proxy Ring Signature Scheme [J]. 2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 560 - +