共 50 条
- [21] Structured Proxy Multi-Signature Scheme with Fingerprint [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 724 - 727
- [22] Proxy Multi-Signature Scheme in the Standard Model [J]. MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 2077 - 2085
- [23] Independent verification of proxy multi-signature scheme [J]. Int. J. Comput. Sci. Eng., 4 (301-311):
- [24] Attack and Improvement of a Proxy Multi-Signature Scheme [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ELECTRONIC TECHNOLOGY, 2016, 48 : 60 - 63
- [26] Formal model of proxy multi-signature and a construction [J]. Jisuanji Xuebao, 2006, 9 (1628-1635):
- [27] A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME [J]. Journal of Electronics(China), 2006, (04) : 560 - 563
- [29] A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME [J]. Journal of Electronics, 2006, (04) : 560 - 563