共 50 条
- [31] A proxy blind signature scheme based on elliptic curve with proxy revocation SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 99 - +
- [32] Limited proxy signature scheme based on elliptic curve Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2002, 24 (12): : 1825 - 1828
- [33] Anonymous proxy signature scheme based on elliptic curve Nanjing Li Gong Daxue Xuebao/Journal of Nanjing University of Science and Technology, 2012, 36 (SUPPL.1): : 100 - 104
- [34] Cryptanalysis of threshold proxy signature scheme based on factoring ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 473 - +
- [35] Threshold ring signature scheme based on the curve 2003 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY - PROCEEDINGS, 2003, : 139 - 139
- [37] An Improved Threshold Proxy Signature Scheme Based on RSA PROCEEDINGS OF THE 2016 6TH INTERNATIONAL CONFERENCE ON MANAGEMENT, EDUCATION, INFORMATION AND CONTROL (MEICI 2016), 2016, 135 : 629 - 632
- [38] An elliptic curve proxy signature scheme DCABES 2006 Proceedings, Vols 1 and 2, 2006, : 1151 - 1154
- [40] Improvement of a threshold proxy signature scheme Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2002, 39 (11):