共 50 条
- [31] Smart cards and digital signatures for e-business security [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XVIII, PROCEEDINGS: INFORMATION SYSTEMS, CONCEPTS AND APPLICATIONS OF SYSTEMICS, CYBERNETICS AND INFORMATICS, 2002, : 124 - 129
- [32] The exact security of digital signatures - How to sign with RSA and Rabin [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT '96, 1996, 1070 : 399 - 416
- [33] Generic security-amplifying methods of ordinary digital signatures [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2008, 5037 : 224 - +
- [34] Digital signatures with the Microsoft CryptoAPI - Adding security to Windows applications [J]. DR DOBBS JOURNAL, 1998, 23 (06): : 80 - +
- [35] Security Analysis of Randomize-Hash-then-Sign Digital Signatures [J]. Journal of Cryptology, 2012, 25 : 748 - 779
- [36] Provable security of digital signatures in the tamper-proof device model [J]. DISCRETE MATHEMATICS AND APPLICATIONS, 2008, 18 (04): : 427 - 437
- [37] Digital signatures and the electronic health records: Providing legal and security guarantees [J]. INTERNATIONAL JOURNAL OF BIO-MEDICAL COMPUTING, 1996, 42 (1-2): : 157 - 163
- [38] Effective Design of a Parametrical Security Model for Digital Signatures Using Cryptography [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES), 2016, : 293 - 295
- [40] Security-by-contract: Toward a semantics for digital signatures on mobile code [J]. PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2007, 4582 : 297 - 312