共 50 条
- [31] Efficient ID-based Threshold Ring Signature scheme EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 437 - 442
- [32] An Efficient ID-based Proxy Ring Signature Scheme 2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 560 - +
- [33] A Security Enforcement ID-based Partially Blind Signature Scheme WISM: 2009 INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND MINING, PROCEEDINGS, 2009, : 488 - 492
- [34] An ID-Based Blind Signature from Bilinear Pairing with Unlinkability 2013 3RD INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS, COMMUNICATIONS AND NETWORKS (CECNET), 2013, : 101 - 104
- [35] PROXY BLIND SIGNATURE SCHEME FOR ID-BASED DESIGNATED VERIFIER 2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 376 - 379
- [36] An improved ID-based restrictive partially blind signature scheme PROCEEDINGS OF NINTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING AND PARALLEL/DISTRIBUTED COMPUTING, 2008, : 295 - 300
- [39] ID-based ring signature and proxy ring signature schemes from bilinear pairings Int. J. Netw. Secur., 2007, 2 (187-192):