Constructing secure warrant-based proxy signcryption schemes

  • Authors:
  • Yuan Zhou;Zhenfu Cao;Rongxing Lu

  • Affiliations:
  • Department of Computer Science, Shanghai Jiao Tong University, Shanghai, P.R. China;Department of Computer Science, Shanghai Jiao Tong University, Shanghai, P.R. China;Department of Computer Science, Shanghai Jiao Tong University, Shanghai, P.R. China

  • Venue:
  • CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

_cf_loadingtexthtml="";_cf_contextpath="";_cf_ajaxscriptsrc="/CFIDE/scripts/ajax";_cf_jsonprefix='//';_cf_clientid='0FF7AB38F66EC6C3FDBAD1D6AD12EEF2';Constructing secure warrant-based proxy signcryption schemes function settab() { var mytabs = ColdFusion.Layout.getTabLayout('citationdetails'); mytabs.on('tabchange', function(tabpanel,activetab) { document.cookie = 'picked=' + '2113419' + ',' + activetab.id; }) }function letemknow(){ ColdFusion.Window.show('letemknow');}function testthis(){alert('test');}function loadalert(){ alert("I am in the load alert"); }function loadalert2(){ alert("I am in the load alert2"); } google.load('visualization', '1', {packages:['orgchart']}); google.setOnLoadCallback(drawChart); function drawChart() { var data = new google.visualization.DataTable(); data.addColumn('string', 'Name'); data.addColumn('string', 'Manager'); data.addColumn('string', 'ToolTip'); data.addRows([ [{v:'0', f:'CCS for this Article