Proxy signature schemes based on factoring
Information Processing Letters
Nonrepudiable proxy multi-signature scheme
Journal of Computer Science and Technology
A Practical (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem
IEEE Transactions on Knowledge and Data Engineering
An efficient and practical (t, n) threshold proxy signature scheme with known signers
Fundamenta Informaticae
On the security of some proxy blind signature schemes
ACSW Frontiers '04 Proceedings of the second workshop on Australasian information security, Data Mining and Web Intelligence, and Software Internationalisation - Volume 32
A privacy-protecting proxy signature scheme and its application
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Comments on "A Practical (t,n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem'
IEEE Transactions on Knowledge and Data Engineering
A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
Future Generation Computer Systems - Special issue: Computational chemistry and molecular dynamics
On the efficiency of nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software
Security analysis and improvement of some proxy signature schemes
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Provably secure delegation-by-certification proxy signature schemes
InfoSecu '04 Proceedings of the 3rd international conference on Information security
On the security of some proxy blind signature schemes
Journal of Systems and Software
Factoring based proxy signature schemes
Journal of Computational and Applied Mathematics - Special issue: The international symposium on computing and information (ISCI2004)
Proxy-protected signature secure against the undelegated proxy signature attack
Computers and Electrical Engineering
An RSA-based (t, n) threshold proxy signature scheme with freewill identities
International Journal of Information and Computer Security
A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
Computers and Electrical Engineering
Proxy signatures secure against proxy key exposure
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
On the security of an identity based multi-proxy signature scheme
Computers and Electrical Engineering
A threshold proxy signature scheme with nonrepudiation and anonymity
ISCIS'06 Proceedings of the 21st international conference on Computer and Information Sciences
Identity based delegation network
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Deniable partial proxy signatures
ASIAN'04 Proceedings of the 9th Asian Computing Science conference on Advances in Computer Science: dedicated to Jean-Louis Lassez on the Occasion of His 5th Cycle Birthday
Security analysis of some threshold signature schemes and multi-signature schemes
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Short designated verifier proxy signature from pairings
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Securing admission control in ubiquitous computing environment
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Cryptanalysis of some group-oriented proxy signature schemes
WISA'05 Proceedings of the 6th international conference on Information Security Applications
Hi-index | 0.00 |