共 38 条
[11]
Du H., 2007, EFFICIENT PROVABLY S
[12]
Fan C-I., 2009, P JWIS09, P1
[13]
Fengyin Li, 2011, Proceedings of the 2011 International Conference on Network Computing and Information Security (NCIS), P35, DOI 10.1109/NCIS.2011.15
[14]
GIRAULT M, 1991, LECT NOTES COMPUT SC, V547, P490
[15]
Gorantla MC, 2005, LECT NOTES ARTIF INT, V3802, P110
[16]
Hongzhen D, 2009, CHINESE J ELECTRON, V18, P95
[17]
Hu BC, 2006, LECT NOTES COMPUT SC, V4058, P235
[18]
Attacks against Two Provably Secure Certificateless Signature Schemes
[J].
2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II,
2009,
:246-+
[19]
Huang XY, 2006, 20TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2, PROCEEDINGS, P15
[20]
Huang XY, 2005, LECT NOTES COMPUT SC, V3810, P13