共 15 条
- [1] Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
- [2] PASSWORD AUTHENTICATION WITH INSECURE COMMUNICATION [J]. COMMUNICATIONS OF THE ACM, 1981, 24 (11) : 770 - 772
- [3] Mambo M, 1996, IEICE T FUND ELECTR, VE79A, P1338
- [4] Mambo M., 1996, 3rd ACM Conference on Computer and Communications Security, P48, DOI 10.1145/238168.238185
- [5] Efficient one-time proxy signatures [J]. IEE PROCEEDINGS-COMMUNICATIONS, 2005, 152 (02): : 129 - 133
- [6] Nicolosi A., 2003, NDSS 2003
- [7] RABIN MO, 1978, FDN SECURE COMPUTATI, P155
- [8] Schnorr C.P., 2001, LNCS, V2229, P1, DOI [10.1007/3- 540-45600-7_1, DOI 10.1007/3-540-45600-7_1]
- [9] Stadler M. A., 1994, ADV CRYPTOLOGY EUROC, P428
- [10] Wang GL, 2005, INT FED INFO PROC, V181, P409