共 14 条
[3]
GUILLOU LC, 1990, LECT NOTES COMPUT SC, V403, P216
[4]
KIM S, 1997, LECT NOTES COMPUTER, V1334, P223
[5]
Mambo M, 1996, IEICE T FUND ELECTR, VE79A, P1338
[6]
Mambo M., 1996, 3rd ACM Conference on Computer and Communications Security, P48, DOI 10.1145/238168.238185
[7]
Neuman B. C., 1993, Proceedings the 13th International Conference on Distributed Computing Systems (Cat. No.93CH3282-1), P283, DOI 10.1109/ICDCS.1993.287698
[8]
RIVEST RL, 1978, COMMUN ACM, V21, P120, DOI 10.1145/357980.358017
[10]
Threshold proxy signatures
[J].
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES,
1999, 146 (05)
:259-263