Controlled Delegation in e-cheques Using Proxy Signatures
暂无分享,去创建一个
[1] Hossein Ghodosi,et al. Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes , 1999, ACISP.
[2] Anton Cerný,et al. Proxy and Threshold One-Time Signatures , 2003, ACNS.
[3] Huaxiong Wang,et al. Efficient One-Time Proxy Signatures , 2003, ASIACRYPT.
[4] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[5] Tzonelih Hwang,et al. On Zhang's Nonrepudiable Proxy Signature Schemes , 1998, ACISP.
[6] Kan Zhang,et al. Threshold Proxy Signature Schemes , 1997, ISW.
[7] Dongho Won,et al. Proxy signatures, Revisited , 1997, ICICS.
[8] Jung Hee Cheon,et al. An Analysis of Proxy Signatures: Is a Secure Channel Necessary? , 2003, CT-RSA.
[9] SchemesKan. Nonrepudiable Proxy Signature , 1997 .
[10] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[11] Byoungcheon Lee,et al. Secure Mobile Agent Using Strong Non-designated Proxy Signature , 2001, ACISP.
[12] Eiji Okamoto,et al. Proxy signatures for delegating signing operation , 1996, CCS '96.
[13] Takeshi Okamoto,et al. Extended Proxy Signatures for Smart Cards , 1999, ISW.