共 50 条
- [32] Threshold signcryption scheme based on elliptic curve cryptosystem and verifiable secret sharing 2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1136 - 1139
- [34] A highly efficient threshold key escrow scheme based on elliptic curve cryptosystem 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 1177 - 1180
- [35] (t, n) Threshold group signature scheme based on elliptic curve cryptosystem Dalian Ligong Daxue Xuebao, 2007, 3 (429-432):
- [36] A Highly Efficient Threshold Key Escrow Scheme Based on Elliptic Curve Cryptosystem ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 2, 2008, : 527 - 532
- [37] A SECURE AND EFFICIENT AUTHENTICATION WITH KEY AGREEMENT SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM ITALIAN JOURNAL OF PURE AND APPLIED MATHEMATICS, 2015, (34): : 101 - 112
- [38] A proxy-protected proxy signature scheme based on elliptic curve cryptosystem 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 184 - 187
- [40] A distributed electronic authentication scheme based on elliptic curve PROCEEDINGS OF 2007 INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND CYBERNETICS, VOLS 1-7, 2007, : 2179 - +