Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference37 articles.
1. Araki, S., Uehara, S., Imamura, K.: The limited verifier signature and its application. IEICE Trans. Fundam. E82–A(1), 63–68 (1999)
2. Chien, H.Y.: Selectively convertible authenticated encryption in the random oracle model. Comput. J. 51(4), 419–434 (2008)
3. Delfs, H., Knebl, H.: Introduction to Cryptography: Principles and Applications. Springer, Berlin (2002)
4. ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inf. Theory IT–31(4), 469–472 (1985)
5. Gamage, G., Leiwo, J., Zheng, Y.: An efficient scheme for secure message transmission using proxy-signcryption. Technical Report 98-01, Monash University (1998)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献