共 50 条
- [41] Improvement on Huang et al.'s Novel Efficient Threshold Proxy Signature Scheme PROCEEDINGS OF 2009 INTERNATIONAL WORKSHOP ON INFORMATION SECURITY AND APPLICATION, 2009, : 116 - 119
- [43] Comment on Lee et al.’s group signature and e-auction scheme Information Systems Frontiers, 2013, 15 : 133 - 139
- [44] Improved Chen et al.'s Concurrent Signature Scheme Providing Anonymity and Identification PROCEEDINGS OF 2010 CROSS-STRAIT CONFERENCE ON INFORMATION SCIENCE AND TECHNOLOGY, 2010, : 639 - 641
- [46] Attack on libert et al.'s ID-based undeniable signature scheme Chin J Electron, 2008, 4 (748-750):
- [47] Security analysis and improvement of hsu et al.'s threshold proxy signature scheme Int. J. Netw. Secur., 2006, 1 (69-72):
- [48] Insecurity of Chait et al.'s RSA-Based Aggregate Signature Scheme IEEE ACCESS, 2024, 12 : 16462 - 16473
- [49] A universal forgery on Araki et al.'s convertible limited verifier signature scheme IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (02): : 515 - 516
- [50] Attack on Libert et al.'s ID-Based Undeniable Signature Scheme CHINESE JOURNAL OF ELECTRONICS, 2008, 17 (04): : 748 - 750