共 50 条
- [31] A New Anonymous Proxy Multi-Signature Scheme [J]. PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 445 - 448
- [32] Structured Proxy Multi-Signature Scheme with Fingerprint [J]. NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 724 - 727
- [33] Proxy Multi-Signature Scheme in the Standard Model [J]. MATERIALS SCIENCE AND INFORMATION TECHNOLOGY, PTS 1-8, 2012, 433-440 : 2077 - 2085
- [34] Independent verification of proxy multi-signature scheme [J]. Int. J. Comput. Sci. Eng., 4 (301-311):
- [35] Attack and Improvement of a Proxy Multi-Signature Scheme [J]. PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ELECTRONIC TECHNOLOGY, 2016, 48 : 60 - 63
- [37] Formal model of proxy multi-signature and a construction [J]. Jisuanji Xuebao, 2006, 9 (1628-1635):
- [38] Threshold multi-proxy multi-signature scheme based on bilinear pairings [J]. WSEAS Transactions on Information Science and Applications, 2007, 4 (11): : 1393 - 1399
- [39] An efficient ID-based multi-proxy multi-signature scheme [J]. FIRST INTERNATIONAL MULTI-SYMPOSIUMS ON COMPUTER AND COMPUTATIONAL SCIENCES (IMSCCS 2006), PROCEEDINGS, VOL 2, 2006, : 81 - +