Publisher
Springer Nature Singapore
Reference14 articles.
1. Lecture Notes in Computer Science;Y Desmedt,1992
2. Zhao, L.S., Liu, J.M.: (t, n) threshold digital signature scheme with traceable signers against conspiracy attacks. In: 2013 5th International Conference on Intelligent Networking and Collaborative Systems, pp. 649–651. IEEE (2013)
3. Gu, K., Wang, Y., Wen, S.: Traceable threshold proxy signature. J. Inf. Sci. Eng. 33(1), 63–79 (2017)
4. Wang, X., Ning, Z., Wang, W., Yang, Y.: Anti-conspiracy attack threshold signature model and protocol paper retracted. Int. J. Wirel. Mob. Comput. 17(3), 300–306 (2019)
5. Lecture Notes in Computer Science;R Kurek,2020