Author:
Rajabzadeh Asaar Maryam,Salmasizadeh Mahmoud,Susilo Willy
Subject
Law,Hardware and Architecture,Software
Reference34 articles.
1. Proxy signatures: delegation of the power to sign messages;Mambo;IEICE Trans. Fundam. Electron. Commun. Comput. Sci.,1996
2. Provably secure proxy-protected signature schemes based on RSA;Shao;Comput. Electr. Eng.,2009
3. Proxy signature schemes based on factoring;Shao;Inf. Process. Lett.,2003
4. Provably secure proxy-protected signature schemes based on factoring;Zhou;Appl. Math. Comput.,2005
5. Cryptanalysis of Zhou et al'.s proxy-protected signature schemes;Park;Appl. Math. Comput.,2005
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献