New Nominative Proxy Signature Scheme for Mobile Communication
暂无分享,去创建一个
[1] Kan Zhang,et al. Threshold Proxy Signature Schemes , 1997, ISW.
[2] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[3] Ioannis Mavridis,et al. Security Issues in a Mobile Computing Paradigm , 1997 .
[4] Yi Mu,et al. On the design of security protocols for mobile communications , 1996, ACISP.
[5] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[6] Yuliang Zheng. An Authentication and Security Protocol for Mobile Computing , 1996, IFIP World Conference on Mobile Communications.