共 50 条
- [1] Limited proxy signature scheme based on elliptic curve [J]. Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2002, 24 (12): : 1825 - 1828
- [2] Anonymous proxy signature scheme based on elliptic curve [J]. Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2012, 36 (SUPPL.1): : 100 - 104
- [3] A proxy blind signature scheme based on elliptic curve with proxy revocation [J]. SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 99 - +
- [4] An Improved Proxy Signature Scheme Based on Elliptic Curve Cryptography [J]. PROCEEDINGS OF THE 2009 INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2009, : 88 - 91
- [7] A proxy-protected proxy signature scheme based on elliptic curve cryptosystem [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 184 - 187
- [8] Cryptanalysis of a proxy-protected proxy signature scheme based on elliptic curve cryptosystem [J]. VTC2004-FALL: 2004 IEEE 60TH VEHICULAR TECHNOLOGY CONFERENCE, VOLS 1-7: WIRELESS TECHNOLOGIES FOR GLOBAL SECURITY, 2004, : 3240 - 3243
- [9] Nonrepudiable threshold proxy signature scheme based on elliptic curve cryptography [J]. Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University, 2007, 42 (01): : 8 - 12
- [10] A new proxy multi-signature scheme and the elliptic curve cryptography [J]. WMSCI 2005: 9th World Multi-Conference on Systemics, Cybernetics and Informatics, Vol 8, 2005, : 180 - 184