Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Signcryption and Its Applications in Efficient Public Key Solutions
ISW '97 Proceedings of the First International Workshop on Information Security
On the security of some proxy blind signature schemes
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
Security analysis and improvement of some proxy signature schemes
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Provably secure delegation-by-certification proxy signature schemes
InfoSecu '04 Proceedings of the 3rd international conference on Information security
On the security of some proxy blind signature schemes
Journal of Systems and Software
Cryptanalysis and improvement of a threshold proxy signature scheme
Computer Standards & Interfaces
Provably secure proxy-protected signature schemes based on RSA
Computers and Electrical Engineering
Improvement of identity-based proxy multi-signature scheme
Journal of Systems and Software
An efficient secure proxy verifiably encrypted signature scheme
Journal of Network and Computer Applications
Convertible undeniable proxy signatures: security models and efficient construction
WISA'07 Proceedings of the 8th international conference on Information security applications
Threshold based group-oriented nominative proxy signature scheme for digital rights management
CCNC'10 Proceedings of the 7th IEEE conference on Consumer communications and networking conference
A controllable anonymous proxy signature scheme with revocation
ICIC'10 Proceedings of the Advanced intelligent computing theories and applications, and 6th international conference on Intelligent computing
Breaking Pomykala-Barabasz Threshold Proxy Signature Scheme
Fundamenta Informaticae
Cryptanalysis of Li et al.'s proxy signature scheme
CONTROL'05 Proceedings of the 2005 WSEAS international conference on Dynamical systems and control
Improvement of a nominative proxy signature scheme for mobile communication
CONTROL'05 Proceedings of the 2005 WSEAS international conference on Dynamical systems and control
Policy-based authentication for mobile agents
ISPEC'11 Proceedings of the 7th international conference on Information security practice and experience
ID-Based proxy signature using bilinear pairings
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Constructing secure warrant-based proxy signcryption schemes
CANS'05 Proceedings of the 4th international conference on Cryptology and Network Security
A short proxy signature scheme: efficient authentication in the ubiquitous world
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A special proxy signature scheme with multi-warrant
ASIAN'09 Proceedings of the 13th Asian conference on Advances in Computer Science: information Security and Privacy
On the security of some nonrepudiable threshold proxy signature schemes
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Security weaknesses in two proxy signature schemes
ICCSA'06 Proceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III
Forgeability attack of two special signature schemes
ICIC'11 Proceedings of the 7th international conference on Advanced Intelligent Computing
Identity-based proxy signature from pairings
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Hi-index | 0.00 |
Based on the development of mobile communication, the future mobile communication systems are expected to provide higher quality of multimedia services for users than today's systems. Therefore, many technical factors are needed in this systems. Especially the secrecy and the safety would be obtained through the introduction of the security for mobile communication. In this paper, we presents a digital nominative proxy signature scheme that processes a user's digital signature and encryption using the proxy-agent who has more computational power than origins in mobile communication.