On the security of an ID-based anonymous proxy signature scheme and its improved scheme
暂无分享,去创建一个
[1] Herbert Bos,et al. Safe execution of untrusted applications on embedded network processors , 2008, Int. J. Embed. Syst..
[2] Ajay Luthra,et al. Overview of the H.264/AVC video coding standard , 2003, IEEE Trans. Circuits Syst. Video Technol..
[3] Bao Li,et al. Universally composable zero-knowledge sets , 2012, Int. J. Grid Util. Comput..
[4] Michael W. Marcellin,et al. JPEG2000 - image compression fundamentals, standards and practice , 2002, The Kluwer International Series in Engineering and Computer Science.
[5] Gregory K. Wallace,et al. The JPEG still picture compression standard , 1992 .
[6] Jianhong Zhang,et al. SPA : Self-certified PKC-based Privacy-preserving Authentication Protocol for Vehicular Ad Hoc Networks , 2012 .
[7] Chengyu Hu,et al. An enhanced ID-Based anonymous proxy signature scheme on pairings , 2010, 2010 The 2nd International Conference on Computer and Automation Engineering (ICCAE).
[8] Haibo Tian. A new strong multiple designated verifiers signature , 2012, Int. J. Grid Util. Comput..
[9] P. N. Tudor. MPEG-2 video compression , 1995 .
[10] Yue Wang,et al. A new proxy blind signature scheme , 2012, Int. J. Grid Util. Comput..
[11] Victor K.-W. Wei,et al. A strong proxy signature scheme with proxy signer privacy protection , 2002, Proceedings. Eleventh IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[12] Yang Yi-xian. A Anonymous Proxy Signature Scheme without a Trusted Party , 2005 .
[13] Joseph Zambreno,et al. Reconfigurable hardware implementation of a modified chaotic filter bank scheme , 2010, Int. J. Embed. Syst..
[14] Michael W. Marcellin,et al. JPEG2000 - image compression fundamentals, standards and practice , 2013, The Kluwer international series in engineering and computer science.
[15] Zixiang Xiong,et al. Three-dimensional embedded subband coding with optimized truncation , 2001 .
[16] Wenchao Jiang,et al. A novel service scheduling policy based on logical subnet partitioning in Bio-Grid environments , 2011, Int. J. Grid Util. Comput..
[17] Bin Li,et al. An ID-based Anonymous Proxy Signature From Bilinear Pairings , 2006, Security and Management.
[18] David S. Taubman,et al. High performance scalable image compression with EBCOT , 1999, Proceedings 1999 International Conference on Image Processing (Cat. 99CH36348).
[19] Zixiang Xiong,et al. Memory-constrained 3D wavelet transform for video coding without boundary effects , 2002, IEEE Trans. Circuits Syst. Video Technol..
[20] Jianhong Zhang,et al. On the Security of a Proxy Ring Signature with Revocable Anonymity , 2009, 2009 International Conference on Multimedia Information Networking and Security.
[21] Jianhong Zhang,et al. On the Security of an Enhanced ID-Based Anonymous Proxy Signature Scheme in ICCAE2010 , 2012, 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems.
[22] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[23] David L. Neuhoff,et al. Quantization (invited paper) , 2000 .
[24] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[25] Gary J. Sullivan,et al. Video Compression - From Concepts to the H.264/AVC Standard , 2005, Proceedings of the IEEE.