Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Networks and Communications,Information Systems
Reference18 articles.
1. Leiwo, J., Hänle, C., Homburg, P., & Tanenbaum, A. S. (2000). Disallowing unauthorized state changes of distributed shared objects. In IFIP international information security conference (pp. 381–390). Springer.
2. Park, H.-U., & Lee, I.-Y. (2001). A digital nominative proxy signature scheme for mobile communication. In International conference on information and communications security (pp. 451–455). Springer.
3. Cao, F., & Cao, Z. (2009). A secure identity-based proxy multi-signature scheme. Information Sciences, 179(3), 292–302.
4. Mambo, M., Usuda, K., & Okamoto, E. (1996). Proxy signatures: Delegation of the power to sign messages. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 79(9), 1338–1354.
5. Yi, L., Bai, G., & Xiao, G. (2000). Proxy multi-signature scheme: A new type of proxy signature scheme. Electronics Letters, 36(6), 527–528.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献