共 50 条
- [41] Security analysis of choi et al.'s certificateless short signature scheme Journal of Information Hiding and Multimedia Signal Processing, 2013, 4 (03): : 147 - 154
- [42] Comments on the security flaw of hwang et al.'s blind signature scheme Int. J. Netw. Secur., 2008, 2 (185-189):
- [44] Cryptanalysis of Yang et al.'s Handover Authentication Scheme For Mobile Network Environment 2017 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROLS (ISCSIC), 2017, : 152 - 157
- [46] Security Analysis and Improvement of Pairing-Based Threshold Proxy Signature Scheme 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 64 - +
- [47] Improvement of a new proxy signature scheme Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2008, 30 (01): : 245 - 248
- [48] Improvement of a Self Proxy Signature Scheme ADVANCES IN SCIENCE AND ENGINEERING, PTS 1 AND 2, 2011, 40-41 : 643 - 646
- [49] Attack and improvement of a proxy signature scheme Dianzi Keji Daxue Xuebao/Journal of the University of Electronic Science and Technology of China, 2011, 40 (04): : 616 - 619