Author:
Shi Jinjing,Shi Ronghua,Tang Ying,Lee Moon Ho
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Modeling and Simulation,Signal Processing,Theoretical Computer Science,Statistical and Nonlinear Physics,Electronic, Optical and Magnetic Materials
Reference32 articles.
1. William S.: Cryptography and Network Security: Principles and Practice, pp. 67–70. 2nd edn. Prentice Hall, New Jersey (2003)
2. Mambo, M., Usuda, K., Okamoto, E.: Proxy signatures for delegating signing operation. In: Proceedings Third ACM Conference on Computer and Communications Security, pp. 48–57. New Delhi, India (1996)
3. Schneier B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, pp. 79–80. 2nd edn. John Wiley and Sons, New York (1996)
4. Chaum D., Heyst E.V.: Group signatures, advances in cryptography-EUROCRYPT’91. Lect. Notes Comput. Sci. 547, 257–265 (1991)
5. Zeng G.H., Keitel C.H.: Arbitrated quantum signature scheme. Phys. Rev. A. 65(042312), 1–6 (2002)
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献