共 50 条
[21]
Cryptanalysis of ID-Based Digital Signature Scheme on Elliptic Curve Cryptosystem
[J].
ISDA 2008: EIGHTH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, VOL 3, PROCEEDINGS,
2008,
:3-+
[22]
The efficient proxy-protected proxy-signcryption scheme based on the ECKCDSA for mobile environment
[J].
6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS II,
2002,
:26-30
[23]
An Efficient Forward-Secure Proxy-Protected Signature Scheme Based on the Strong RSA Assumption
[J].
ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4,
2010,
:259-264
[24]
Nonrepudiable threshold proxy signature scheme based on elliptic curve cryptography
[J].
Xinan Jiaotong Daxue Xuebao/Journal of Southwest Jiaotong University,
2007, 42 (01)
:8-12
[26]
Two Improved Proxy Multi-signature Schemes Based on the Elliptic Curve Cryptosystem
[J].
2010 SECOND INTERNATIONAL CONFERENCE ON E-LEARNING, E-BUSINESS, ENTERPRISE INFORMATION SYSTEMS, AND E-GOVERNMENT (EEEE 2010), VOL I,
2010,
:423-426
[27]
Two Improved Proxy Multi-signature Schemes Based on the Elliptic Curve Cryptosystem
[J].
COMPUTING AND INTELLIGENT SYSTEMS, PT IV,
2011, 234
:101-+
[28]
A generalized proxy signature scheme based on the RSA cryptosystem
[J].
PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS,
2004, 3320
:662-665
[29]
Cryptanalysis of threshold proxy signature scheme based on factoring
[J].
ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1,
2008,
:473-+