共 50 条
- [2] Attacks on provably secure proxy-protected signature schemes based on factoring [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2007, 10 (02): : 193 - 204
- [3] An Efficient Forward-Secure Proxy-Protected Signature Scheme Based on the Strong RSA Assumption [J]. ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 259 - 264
- [5] Provably Secure Certificate-based Proxy Signature Schemes [J]. JOURNAL OF COMPUTERS, 2009, 4 (06) : 444 - 452
- [7] A Proxy-Protected Signature Scheme Based on Finite Automaton [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 48 - +
- [8] An efficient proxy-protected signature scheme based on factoring [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 332 - 341
- [9] A proxy-protected proxy signature scheme based on elliptic curve cryptosystem [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 184 - 187