共 50 条
- [42] Cryptanalysis of Barni et al. watermarking scheme [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2005, PROCEEDINGS, 2005, 3797 : 197 - 208
- [45] Cryptanalysis of Mu et al.'s and Li et al.'s Schemes and a Provably Secure ID-Based Broadcast Signcryption (IBBSC) Scheme [J]. INFORMATION SECURITY APPLICATIONS, 2009, 5379 : 115 - 129
- [46] Comment on Lee J-s et al.'s identity-based designated verifer proxy signature scheme and its improvement [J]. SMART MATERIALS AND INTELLIGENT SYSTEMS, PTS 1 AND 2, 2011, 143-144 : 753 - +
- [47] Comments on Shao's blind signature scheme [J]. PARALLEL AND DISTRIBUTED COMPUTING, APPLICATIONS AND TECHNOLOGIES, PDCAT'2003, PROCEEDINGS, 2003, : 940 - 941
- [49] An improvement on Lee et al.'s nonce-based authentication scheme [J]. WSEAS Transactions on Information Science and Applications, 2007, 4 (04): : 832 - 835
- [50] Attacks to Li et al.'s Billing Service User Authentication Scheme [J]. MATERIALS, MECHANICAL ENGINEERING AND MANUFACTURE, PTS 1-3, 2013, 268-270 : 1762 - 1767