Author:
Zhang Hai-Yan,Zhang Long,Zhang Ke-Jia
Funder
Natural Science Foundation of Heilongjiang Province
Youth Foundation of Heilongjiang University
Hei Long Jiang Postdoctoral Foundation Grant
Graduates Innovation Scientific Research Foundation of Heilongjiang University
Publisher
Springer Science and Business Media LLC
Subject
Physics and Astronomy (miscellaneous),General Mathematics
Reference63 articles.
1. Gasser, M., Goldstein, A., Kaufman, C., Lampson, B.: The digital distributed system security architecture. In: Proceedings of national computer security conference, pp. 305-319 (1989)
2. Mambo, M, Usuda, K, Okamoto, E.: Proxy signatures: delegation of the power to sign messages. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 79 (9), 1338–1354 (1996)
3. Kim, S., Park, S., Won, D.: Proxy signatures revisited. In: Proceedings of information and communications security (ICICS97), LNCS 1334, Springer, pp. 223-232 (1997)
4. Grover, L.K.: A fast quantum mechanical algorithm for database search. In: Proceedings of the 28th annual ACM symposium on Theory of computing. ACM, pp. 212–219 (1996)
5. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献