Cryptanalysis of a strong proxy signature scheme with proxy signer privacy protection
暂无分享,去创建一个
[1] Victor K.-W. Wei,et al. A strong proxy signature scheme with proxy signer privacy protection , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[2] Christian F. Tschudin,et al. Towards mobile cryptography , 1998, Proceedings. 1998 IEEE Symposium on Security and Privacy (Cat. No.98CB36186).
[3] Panayiotis Kotzanikolaou,et al. Secure Transactions with Mobile Agents in Hostile Environments , 2000, ACISP.
[4] Patrick Horster,et al. Self-certified keys — Concepts and Applications , 1997 .
[5] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[6] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[7] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[8] Byoungcheon Lee,et al. Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.