共 50 条
- [32] Security analysis of a proxy signature scheme based on the elliptic curve cryptosystem [J]. SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 58 - 64
- [33] Cryptanalysis of threshold proxy signature scheme based on factoring [J]. ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 473 - +
- [35] Undeniable Threshold Proxy Signature Scheme [J]. 2013 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (CSIT), 2013, : 150 - 153
- [36] A SECURE THRESHOLD PROXY SIGNATURE SCHEME [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2012, 18 (06): : 617 - 625
- [39] Improvement of a threshold proxy signature scheme [J]. PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 3168 - 3172
- [40] An efficient implementation of a threshold RSA signature scheme [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2005, 3574 : 382 - 393