Author:
Wang Guilin,Bao Feng,Zhou Jianying,Deng Robert H.
Publisher
Springer Berlin Heidelberg
Reference32 articles.
1. Adams, C., Farrell, S.: Internet X.509 public key infrastructure: Certificate management protocols. RFC 2510 (March 1999)
2. Lecture Notes in Computer Science;M. Ai-Ibrahim,2003
3. Bakker, A., Steen, M., Tanenbaum, A.S.: A law-abiding peer-to-peer network for free-software distribution. In: IEEE International Symposium on Network Computing and Applications (NCA 2001), pp. 60–67. IEEE, Los Alamitos (2001)
4. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: Proc. of 1st ACM Conference on Computer and Communications Security (CCS 1993), pp. 62–73. ACM Press, New York (1993)
5. Boldyreva, A., Palacio, A., Warinschi, B.: Secure proxy signature schemes for delegation of signing rights, Available at http://eprint.iacr.org/2003/096
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献