Author:
Wei Jiannan,Yang Guomin,Mu Yi,Liang Kaitai
Publisher
Oxford University Press (OUP)
Reference21 articles.
1. Mambo M. , Usuda K. and Okamoto E. (1996) Proxy Signatures for Delegating Signing Operation. Proc. 3rd ACM Conf. on Computer and Communications Security, CCS'96, New Delhi, India, March 14–16, pp. 48–57. ACM, New York.
2. Traceable ring signature;Fujisaki;IEICE Trans.,2008
3. Kim S. , Park S. and Won D. (1997) Proxy Signatures, Revisited. Proc. 1st Int. Conf. on Information and Communication Security, ICICS'97, Beijing, China, November 11–14, Lecture Notes in Computer Science 1334, pp. 223–232. Springer, London.
4. Lee B. , Kim H. and Kim K. (2001) Strong Proxy Signature and its Applications. Proc. 2001 Symposium on Cryptography and Information Security, Oiso, Japan, January 23–26, pp. 603–608. IEICE.
5. Zhang F. , Safavi-Naini R. and Lin C.-Y. (2004) Some New Proxy Signature Schemes from Pairings. Progress on Cryptography, pp. 59–66. Springer, USA.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献