Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference37 articles.
1. The limited verifier signature and its application;Araki;IEICE Trans. Fundam.,1999
2. A secure identity-based proxy multi-signature scheme;Cao;Inform. Sci.,2009
3. A convertible multi-authenticated encryption scheme for group communications;Chang;Inform. Sci.,2008
4. Selectively convertible authenticated encryption in the random oracle model;Chien;Comput. J.,2008
5. Smart Card Security and Applications;Hendry,1997
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献