共 50 条
- [1] An efficient proxy-protected signature scheme based on factoring [J]. PARALLEL AND DISTRIBUTED PROCESSING AND APPLICATIONS - ISPA 2005 WORKSHOPS, 2005, 3759 : 332 - 341
- [2] A proxy-protected proxy signature scheme based on elliptic curve cryptosystem [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 184 - 187
- [3] Cryptanalysis and improvement of a proxy-protected signature scheme [J]. SECOND INTERNATIONAL CONFERENCE ON FUTURE NETWORKS: ICFN 2010, 2010, : 363 - 366
- [4] Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem [J]. VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3240 - 3243
- [5] A Controlled Proxy-Protected Signature Scheme with Instantaneous Revocation [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (03): : 27 - 30
- [8] An Efficient Forward-Secure Proxy-Protected Signature Scheme Based on the Strong RSA Assumption [J]. ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 259 - 264