共 6 条
[1]
W. Stallings.Network Security Essentials: Applications and Standards. . 2010
[2]
W B Lee,C Y Cang.Efficient proxy-protected proxy signature scheme based on discrete logarithm. Proceedings of 10th Conference on information security . 2000
[3]
W-B Lee,C-K Yeh.A new delegation-based authentication protocol for use in portable communication systems. IEEE Trans Wirel Commun . 2005
[4]
T.-K Youn,J. Lin."Improved delegation-based authentication protocol for secure roaming service with unlinkability". IEEE Communications Letters . 2010
[5]
Mambo M,Usuda K,Okamoto E.Proxy signature: delegation of the power to sign messages. IEICE Transactions on Fundamentals of Electronic Communications and Computer Science . 1996
[6]
T.-F. Lee,S.-H. Chang,T. Hwang,S.-K. Chong."Enhanced delegation-based authentication protocol for PCSs". IEEE Trans. on Wireless Communications . 2009