Proxy signature schemes based on factoring
Information Processing Letters
Secure Mobile Agent Using Strong Non-designated Proxy Signature
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
A Secure Agent-Mediated Payment Protocol
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
INDOCRYPT '02 Proceedings of the Third International Conference on Cryptology: Progress in Cryptology
On the Difficulty of Key Recovery Systems
ISW '99 Proceedings of the Second International Workshop on Information Security
Extended Proxy Signatures for Smart Cards
ISW '99 Proceedings of the Second International Workshop on Information Security
Nonrepudiable proxy multi-signature scheme
Journal of Computer Science and Technology
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
IEEE Transactions on Knowledge and Data Engineering
An efficient and practical (t, n) threshold proxy signature scheme with known signers
Fundamenta Informaticae
A new signature scheme: joint-signature
Proceedings of the 2004 ACM symposium on Applied computing
A secure method for signature delegation to mobile agents
Proceedings of the 2004 ACM symposium on Applied computing
On the security of some proxy blind signature schemes
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Comments on "A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem'
IEEE Transactions on Knowledge and Data Engineering
A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
Future Generation Computer Systems - Special issue: Computational chemistry and molecular dynamics
On the efficiency of nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software
Security analysis and improvement of some proxy signature schemes
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Provably secure delegation-by-certification proxy signature schemes
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Autonomous mobile agent based fair exchange
Computer Networks: The International Journal of Computer and Telecommunications Networking
On the security of some proxy blind signature schemes
Journal of Systems and Software
Factoring based proxy signature schemes
Journal of Computational and Applied Mathematics - Special issue: The international symposium on computing and information (ISCI2004)
A novel proxy key generation protocol and its application
Computer Standards & Interfaces
Improvement of Yang et al.'s threshold proxy signature scheme
Journal of Systems and Software
Insider attacks on multi-proxy multi-signature schemes
Computers and Electrical Engineering
Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers
Fundamenta Informaticae
Proxy-protected signature secure against the undelegated proxy signature attack
Computers and Electrical Engineering
Identity based proxy multi-signature
Journal of Systems and Software
Information Sciences: an International Journal
An RSA-based (t, n) threshold proxy signature scheme with freewill identities
International Journal of Information and Computer Security
Security Analysis of the Pomykala-Barabasz Scheme
Fundamenta Informaticae
Informatica
ID-Based (t,n) Threshold Proxy Signcryption for Multi-agent Systems
Computational Intelligence and Security
An Efficient ID-Based Proxy Signature Scheme from Pairings
Information Security and Cryptology
Efficient Generic Forward-Secure Signatures and Proxy Signatures
EuroPKI '08 Proceedings of the 5th European PKI workshop on Public Key Infrastructure: Theory and Practice
Cryptanalysis and improvement of a threshold proxy signature scheme
Computer Standards & Interfaces
Secure multiple-times proxy signature scheme
Computer Standards & Interfaces
An efficient anonymous proxy signature scheme with provable security
Computer Standards & Interfaces
A privacy problem on Hu-Huang's proxy key generation protocol
Computer Standards & Interfaces
A secure identity-based multi-proxy signature scheme
Computers and Electrical Engineering
Provably secure proxy-protected signature schemes based on RSA
Computers and Electrical Engineering
Designated verifier proxy signature scheme without random oracles
Computers & Mathematics with Applications
Efficient self-certified proxy CAE scheme and its variants
Journal of Systems and Software
Analysis on a Non-repudiable Threshold Proxy Signature Scheme with Known Signers
ISNN 2009 Proceedings of the 6th International Symposium on Neural Networks: Advances in Neural Networks - Part II
Efficient Authorization in Delegation Chains with Strong Non-Repudiation
Proceedings of the 2005 conference on Applied Public Key Infrastructure: 4th International Workshop: IWAP 2005
Efficient threshold proxy signature protocol for mobile agents
Information Sciences: an International Journal
Autonomous mobile agent based fair exchange
Computer Networks: The International Journal of Computer and Telecommunications Networking
New threshold-proxy threshold-signature schemes
Computers and Electrical Engineering
A novel efficient (t,n) threshold proxy signature scheme
Information Sciences: an International Journal
Remarks on the security of the strong proxy signature scheme with proxy signer privacy protection
International Journal of Information and Computer Security
A threshold proxy signature scheme from bilinear pairings
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Efficient ID-based blind signature and proxy signature from bilinear pairings
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
A closer look at PKI: security and efficiency
PKC'07 Proceedings of the 10th international conference on Practice and theory in public-key cryptography
Cryptanalysis of some proxy signature schemes without certificates
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
Invisibility and anonymity of undeniable and confirmer signatures
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
Convertible undeniable proxy signatures: security models and efficient construction
WISA'07 Proceedings of the 8th international conference on Information security applications
A new nonrepudiable threshold proxy signature scheme with valid delegation period
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part III
Proxy signatures secure against proxy key exposure
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Building femtocell more secure with improved proxy signature
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Efficient proxy signcryption scheme with provable CCA and CMA security
Computers & Mathematics with Applications
Provably secure multi-proxy signature scheme with revocation in the standard model
Computer Communications
Verifying a delegation protocol for grid systems
Future Generation Computer Systems
Secure and efficient protocol for vehicular ad hoc network with privacy preservation
EURASIP Journal on Wireless Communications and Networking - Special issue on security and resilience for smart devices and applications
Cryptanalysis of Li et al.'s proxy signature scheme
CONTROL'05 Proceedings of the 2005 WSEAS international conference on Dynamical systems and control
Improvement of a nominative proxy signature scheme for mobile communication
CONTROL'05 Proceedings of the 2005 WSEAS international conference on Dynamical systems and control
On the security of an identity based multi-proxy signature scheme
Computers and Electrical Engineering
A traceable certificateless threshold proxy signature scheme from bilinear pairings
APWeb'11 Proceedings of the 13th Asia-Pacific web conference on Web technologies and applications
Strongly unforgeable proxy signature scheme secure in the standard model
Journal of Systems and Software
Correcting a delegation protocol for grids
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
ID-based proxy signature scheme with message recovery
Journal of Systems and Software
A novel ID-Based partial delegation with warrant proxy signature scheme
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
An efficient proxy-protected signature scheme based on factoring
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Identity based delegation network
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Efficient ID-based proxy signature and proxy signcryption form bilinear pairings
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
RFID system with fairness within the framework of security and privacy
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
Improvement of hsu-wu-he’s proxy multi-signature schemes
SDM'05 Proceedings of the Second VDLB international conference on Secure Data Management
Efficient certificateless proxy signature scheme with provable security
Information Sciences: an International Journal
Security analysis of some threshold signature schemes and multi-signature schemes
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
A short proxy signature scheme: efficient authentication in the ubiquitous world
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
An RFID system based MCLT system with improved privacy
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
A mediated proxy signature scheme with fast revocation for electronic transactions
TrustBus'05 Proceedings of the Second international conference on Trust, Privacy, and Security in Digital Business
Proxy structured multisignature scheme from bilinear pairings
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Secure role activation and authorization in the enterprise environment
EuroPKI'05 Proceedings of the Second European conference on Public Key Infrastructure
On the security of some nonrepudiable threshold proxy signature schemes
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Revisiting fully distributed proxy signature schemes
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Security model of proxy-multi signature schemes
CANS'06 Proceedings of the 5th international conference on Cryptology and Network Security
Cryptanalysis of some group-oriented proxy signature schemes
WISA'05 Proceedings of the 6th international conference on Information Security Applications
A simple and robust handover authentication between HeNB and eNB in LTE networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Pairing-based strong designated verifier proxy signature scheme with low cost
Security and Communication Networks
An efficient nonrepudiable threshold proxy signature scheme with known signers
Computer Communications
Security Analysis of the Pomykala-Barabasz Scheme
Fundamenta Informaticae
Eliptic Curve Based Threshold Proxy Signature Scheme with Known Signers
Fundamenta Informaticae
An Efficient and Practical (t, n) Threshold Proxy Signature Scheme with Known Signers
Fundamenta Informaticae
Cryptanalysis of the Hwang-Shi Proxy Signature Scheme
Fundamenta Informaticae
Identity-based proxy signature from pairings
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
A new proxy signature scheme for a specified group of verifiers
Information Sciences: an International Journal
Proxy signature scheme based on isomorphisms of polynomials
NSS'12 Proceedings of the 6th international conference on Network and System Security
Secure proxy signature schemes from the Weil pairing
The Journal of Supercomputing
International Journal of Security and Networks
Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
Information Processing Letters
Towards provably secure proxy signature scheme based on Isomorphisms of Polynomials
Future Generation Computer Systems
Software Service Signature (S3) for authentication in cloud computing
Cluster Computing
Hi-index | 0.00 |