共 11 条
[1]
KIM S, 1997, P INT C INF COMM SEC, P223
[2]
Mambo M, 1996, IEICE T FUND ELECTR, VE79A, P1338
[3]
Mambo M., 1996, 3rd ACM Conference on Computer and Communications Security, P48, DOI 10.1145/238168.238185
[5]
RIVEST RL, 1978, CACM, V21, P2
[7]
Design of time-stamped proxy signatures with traceable receivers
[J].
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES,
2000, 147 (06)
:462-466
[8]
Wang GL, 2004, LECT NOTES COMPUT SC, V2971, P305
[10]
ZHANG K, 1997, P 1 INT INF SEC WORK, P282