共 15 条
- [1] [Anonymous], LNCS
- [2] Bellare M., 2006, Proceedings of the 13th ACM Conference on Computer and Communications Security. CCS'06, P390, DOI DOI 10.1145/1180405.1180453
- [3] Bellare M, 2007, LECT NOTES COMPUT SC, V4377, P145
- [4] Boldyreva A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P276
- [5] Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
- [6] Cha JC, 2003, LECT NOTES COMPUT SC, V2567, P18
- [7] Cheng XG, 2005, LECT NOTES COMPUT SC, V3483, P1046
- [8] Gentry C, 2006, LECT NOTES COMPUT SC, V3958, P257
- [9] GUILLOU LC, 1990, LECT NOTES COMPUT SC, V403, P216
- [10] Efficient identity-based RSA multisignatures [J]. COMPUTERS & SECURITY, 2008, 27 (1-2) : 12 - 15