Subject
Electrical and Electronic Engineering,General Computer Science,Control and Systems Engineering
Reference39 articles.
1. Proxy signatures: delegation of the power to sign messages;Mambo;IEICE Trans Fundam,1996
2. Leiwo J, Hanle C, Homburg P, Tanenbaum AS. Disallowing unauthorized state changes of distributed shared objects. In: Information security for global information infrastructures (SEC’00); 2000. p. 381–90.
3. Foster I, Kesselman C, Tsudik G, Tuecke S. A security architecture for computational grids. In: Fifth ACM conference on computers and communications security; 1998. p. 83–92.
4. Park H-U, Lee I-Y. A digital nominative proxy signature scheme for mobile communication. In: Information and communications security (ICICS 2001), LNCS 2229; 2001. p. 451–5.
5. Lee B, Kim H, Kim K. Strong proxy signature and its applications. In: Proceeding of the 2001 symposium on cryptography and information security (SCIS’01), vol. 2/2; 2001. p. 603–8.
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献