Fair blind threshold signatures in wallet with observers
Journal of Systems and Software
Comments on "A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem'
IEEE Transactions on Knowledge and Data Engineering
A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
Future Generation Computer Systems - Special issue: Computational chemistry and molecular dynamics
On the efficiency of nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software
A proxy-protected signature scheme based on conic
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Security analysis and improvement of some proxy signature schemes
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Improvement of Yang et al.'s threshold proxy signature scheme
Journal of Systems and Software
An RSA-based (t, n) threshold proxy signature scheme with freewill identities
International Journal of Information and Computer Security
Security Analysis of the Pomykala-Barabasz Scheme
Fundamenta Informaticae
Secure Proxy Multi-signature Scheme in the Standard Model
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
Analysis on a Non-repudiable Threshold Proxy Signature Scheme with Known Signers
ISNN 2009 Proceedings of the 6th International Symposium on Neural Networks: Advances in Neural Networks - Part II
Efficient threshold proxy signature protocol for mobile agents
Information Sciences: an International Journal
New threshold-proxy threshold-signature schemes
Computers and Electrical Engineering
A new nonrepudiable threshold proxy signature scheme with valid delegation period
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
A threshold proxy signature scheme using self-certified public keys
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
On the security of some nonrepudiable threshold proxy signature schemes
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Security Analysis of the Pomykala-Barabasz Scheme
Fundamenta Informaticae
A new proxy signature scheme for a specified group of verifiers
Information Sciences: an International Journal
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
Information Processing Letters
Hi-index | 0.00 |