An Improvement of Strong Proxy Signature and Its Applications
暂无分享,去创建一个
[1] Hung-Min Sun,et al. An efficient nonrepudiable threshold proxy signature scheme with known signers , 1999, Comput. Commun..
[2] Ashutosh Saxena,et al. Proxy Signature Scheme with Effective Revocation Using Bilinear Pairings , 2007, Int. J. Netw. Secur..
[3] Gu Li-ze. An Improved Proxy Multi-Signature Scheme , 2005 .
[4] Min-Shiang Hwang,et al. A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers , 2000, Informatica.
[5] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[6] Byoungcheon Lee,et al. Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.
[7] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[8] Patrick Horster,et al. Self-certified keys — Concepts and Applications , 1997 .
[9] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[10] Min-Shiang Hwang,et al. A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification , 2004, Future Gener. Comput. Syst..
[11] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[12] Yang Liu,et al. Security Analysis and Improvement of Hsu et al. Threshold Proxy Signature Scheme , 2006, Int. J. Netw. Secur..