共 50 条
- [3] Cryptanalysis and improvement of a proxy-protected signature scheme [J]. SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS: ICFN 2010, 2010, : 363 - 366
- [4] Attacks on provably secure proxy-protected signature schemes based on factoring [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (02): : 193 - 204
- [5] A proxy-protected proxy signature scheme based on elliptic curve cryptosystem [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 184 - 187
- [6] A Proxy-Protected Signature Scheme Based on Finite Automaton [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 48 - +
- [7] An efficient proxy-protected signature scheme based on factoring [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 332 - 341
- [8] A Controlled Proxy-Protected Signature Scheme with Instantaneous Revocation [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (03): : 27 - 30
- [9] Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem [J]. VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3240 - 3243
- [10] An Efficient Forward-Secure Proxy-Protected Signature Scheme Based on the Strong RSA Assumption [J]. ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 259 - 264