共 50 条
- [31] An Efficient Construction of Convertible Undeniable Proxy Signatures [J]. JOURNAL OF INTERNET TECHNOLOGY, 2014, 15 (03): : 471 - 484
- [33] Subliminal Channels in the Code-based Ring Signature Scheme [J]. 2019 14TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2019), 2019, : 146 - 150
- [35] The Biometric Based Convertible Undeniable Multi-Signature Scheme to Ensure Multi-Author Copyrights and Profits [J]. Wireless Personal Communications, 2011, 60 : 405 - 418
- [37] A generic construction for universally-convertible undeniable signatures [J]. CRYPTOLOGY AND NETWORK SECURITY, 2007, 4856 : 15 - 33
- [38] WEAKNESSES OF UNDENIABLE SIGNATURE SCHEMES [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1991, 547 : 205 - 220
- [39] Universally composable undeniable signature [J]. AUTOMATA, LANGUAGES AND PROGRAMMING, PT 2, PROCEEDINGS, 2008, 5126 : 524 - +
- [40] Applications of Undeniable Signature Schemes [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON SIGNAL AND IMAGE PROCESSING APPLICATIONS (ICSIPA), 2015, : 133 - 138