共 50 条
- [21] Security analysis of two signcryption schemes INFORMATION SECURITY, PROCEEDINGS, 2004, 3225 : 123 - 133
- [22] Security analysis and improvements of arbitrated quantum signature schemes PHYSICAL REVIEW A, 2010, 82 (04):
- [23] Security analysis and improvements of certificateless aggregate signature schemes Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2015, 37 (08): : 1994 - 1999
- [24] Security Analysis of Various Authentication Schemes Based on Three Types of Digital Signature Schemes IEEE ACCESS, 2018, 6 : 68804 - 68812
- [25] On the security of two signature schemes for secure communication in IoT environments Multimedia Tools and Applications, 2024, 83 : 43673 - 43683
- [27] On the security of two server-aided verification signature schemes Wu, H. (daisylilac@126.com), 2013, Binary Information Press, P.O. Box 162, Bethel, CT 06801-0162, United States (09):
- [28] On the security of two signature schemes for secure communication in IoT environments Multimedia Tools and Applications, 83 (15): : 43673 - 43683
- [29] Analysis and Attack of Two Ring Signature Schemes AUTOMATION EQUIPMENT AND SYSTEMS, PTS 1-4, 2012, 468-471 : 382 - 385
- [30] Provable security of proxy signature schemes ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1059 - 1063