共 15 条
[1]
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]
Chen M, 2015, APPL RES COMPUTERS, V33, P1
[3]
[杜红珍 Du Hongzhen], 2013, [电子学报, Acta Electronica Sinica], V41, P72
[4]
Feng Jie, 2014, Journal of Computer Applications, V34, P3291, DOI 10.11772/j.issn.1001-9081.2014.11.3291
[5]
Gu K., 2013, COMPUT J, V11, P1
[6]
Huang Ping, 2015, Journal of Computer Applications, V35, P1678, DOI 10.11772/j.issn.1001-9081.2015.06.1678
[8]
Cryptanalysis of a certificateless aggregate signature scheme for mobile computation
[J].
APPLIED MATHEMATICS & INFORMATION SCIENCES,
2013, 7 (04)
:1383-1386
[9]
Kim KS, 2013, J COMMUN NETW-S KOR, V15, P1, DOI [10.1109/JCN.2013.000003, 10.12812/ksms.2013.15.2.1]
[10]
[路标 Lu Biao], 2015, [计算机应用与软件, Computer Applications and Software], V32, P323