Author:
Chow Sherman S. M.,Lui Richard W. C.,Hui Lucas C. K.,Yiu S. M.
Publisher
Springer Berlin Heidelberg
Reference35 articles.
1. Aura, T.: On the Structure of Delegation Networks. In: PCSFW: Proceedings of the Eleventh Computer Security Foundations Workshop. IEEE Computer Society Press, Los Alamitos (1998)
2. Bakker, A., van Steen, M., Tanenbaum, A.S.: A Law-Abiding Peer-to-Peer Network for Free-Software Distribution. In: Proceedings of IEEE International Symposium on Network Computing and Applications (NCA 2001), Cambridge, MA, October 8-10 (2001)
3. Lecture Notes in Computer Science;M. Bellare,2004
4. Lecture Notes in Computer Science;D. Boneh,2003
5. Chen, X., Zhang, F., Kim, K.: ID-based Multi-Proxy Signature and Blind Multisignature from Bilinear Pairings. In: KIISC conference (2003)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Cryptanalysis of Some Proxy Signature Schemes Without Certificates;Information Security Theory and Practices. Smart Cards, Mobile and Ubiquitous Computing Systems;2007
2. An Efficient ID-Based Delegation Network;On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops;2006