共 50 条
- [33] A proxy-protected proxy signature scheme based on elliptic curve cryptosystem 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 184 - 187
- [34] A group-oriented anonymous signature scheme with subliminal channel 2005 IEEE NETWORKING, SENSING AND CONTROL PROCEEDINGS, 2005, : 49 - 53
- [35] A highly efficient threshold key escrow scheme based on elliptic curve cryptosystem 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES: ITESS 2008, VOL 3, 2008, : 1177 - 1180
- [36] Threshold signcryption scheme based on elliptic curve cryptosystem and verifiable secret sharing 2005 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING PROCEEDINGS, VOLS 1 AND 2, 2005, : 1136 - 1139
- [37] A Highly Efficient Threshold Key Escrow Scheme Based on Elliptic Curve Cryptosystem ITESS: 2008 PROCEEDINGS OF INFORMATION TECHNOLOGY AND ENVIRONMENTAL SYSTEM SCIENCES, PT 2, 2008, : 527 - 532
- [38] Elliptic curve cryptosystem on smart card access with threshold scheme IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (10): : 2569 - 2576
- [39] Group-oriented signature scheme with distinguished signing authorities FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2004, 20 (05): : 865 - 873
- [40] Research on group signature with threshold value based on elliptic curve Dongnan Daxue Xuebao, 2008, SUPPL. 1 (43-46):