Author:
Kim Seungjoo,Park Sangjoon,Won Dongho
Publisher
Springer Berlin Heidelberg
Reference15 articles.
1. M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures: Delegation of the power to sign messages,” IEICE Trans. Fundamentals, vol.E79-A, no.9, 1996, pp. 1338–1354
2. M. Mambo, K. Usuda, and E. Okamoto, “Proxy signatures for delegating signing operation,” Proc. Third ACM Conf. on Computer and Communications Security, 1996, pp.48–57
3. K. Usuda, M. Mambo, T. Uyematsu, and E. Okamoto, “Proposal of an automatic signature scheme using a compiler,” IEICE Trans. Fundamentals, vol.E79-A, no.1, 1996, pp.94–101
4. V. Varadharajan, P. Allen, and S. Black, “An analysis of the proxy problem in distributed systems,” Proc. 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991, pp.255–275
5. B.C. Neuman, “Proxy-based authorization and accounting for distributed systems,” Proc. 13th International Conference on Distributed Computing Systems, 1993, pp.283–291
Cited by
177 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献