-
5
-
-
84874800178
-
A public key cryptosystem and signature scheme based on discrete logarithms
-
T. ElGamal, "A public key cryptosystem and signature scheme based on discrete logarithms", IEEE Tran. information Theory, Vol. 31, No. 4, pp. 469-472. 1985.
-
(1985)
IEEE Tran. Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
7
-
-
0010567510
-
Proxy signatures, revisited
-
Springer-Verlag
-
S. Kim, S. Park, and D. Won, "Proxy signatures, revisited", Proc. of ICICS'97, International Conference on Information and Communications Security, LNCS 1334, Springer-Verlag, pp. 223-232, 1997
-
(1997)
Proc. of ICICS'97, International Conference on Information and Communications Security, LNCS 1334
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
8
-
-
1642614187
-
Strong proxy signature and its application
-
January
-
B. Lee, H. Kim, and K. Kim. "Strong proxy signature and its application". The 2001 Symposium on Cryptography and Information Security. Oiso, Japan. Vol 2/2, pp. 603-608, January, 2001.
-
(2001)
The 2001 Symposium on Cryptography and Information Security. Oiso, Japan
, vol.2
, Issue.2
, pp. 603-608
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
9
-
-
0029717329
-
Proxy signatures for delegating signing operation
-
ACM Press New York
-
M. Mambo, K. Usuda, and E. Okamoto, "Proxy signatures for delegating signing operation", Proc. 3rd ACM Conference on Computer and Communications Security, New Dehli, India, ACM Press New York, pp. 48-57, 1996.
-
(1996)
Proc. 3rd ACM Conference on Computer and Communications Security, New Dehli, India
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
10
-
-
84944878354
-
Handbook of Applied Cryptography
-
CRC press
-
A. Menezes, P. Oorschot, and S. Vanstone, "Handbook of Applied Cryptography", CRC press, 1997.
-
(1997)
-
-
Menezes, A.1
Oorschot, P.2
Vanstone, S.3
-
11
-
-
84956995852
-
A digital nominative proxy signature scheme for mobile communication
-
Springer-Verlag
-
Hee-Un Park and Im-Yeong Lee. "A Digital Nominative Proxy Signature Scheme for Mobile Communication". ICICS 2001, LNCS 2229, Springer-Verlag, pp. 451-455, 2001.
-
(2001)
ICICS 2001, LNCS 2229
, pp. 451-455
-
-
Park, H.-U.1
Lee, I.-Y.2
-
14
-
-
0017930809
-
A method for obtaining igital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir, and L.M. Adleman, "A method for obtaining igital signatures and public-key cryptosystems", Communications of the ACM, Vol. 21, No. 2, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
15
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
Springer-verlag
-
C.P. Schnorr. "Efficient identification and signatures for smart cards". Advances in cryptology-crypto'89, LNCS, Vol. 435, Springer-verlag, pp. 239-252, 1990
-
(1990)
Advances in Cryptology-Crypto'89, LNCS
, vol.435
, pp. 239-252
-
-
Schnorr, C.P.1
-
17
-
-
0034313266
-
Design of time-stamped proxy signature with traceable receivers
-
November
-
H.-M. Sun, "Design of time-stamped proxy signature with traceable receivers". In IEE proc. Computers & Digital Techniques, Vol. 147, No. 6, pp. 462-466, November 2000
-
(2000)
IEE Proc. Computers & Digital Techniques
, vol.147
, pp. 462-466
-
-
Sun, H.-M.1
-
18
-
-
0033354258
-
Thresh proxy signatures
-
September
-
H.-M. Sun, N-Y. Lee, and Hwang, t. "Thresh proxy signatures" In IEE proc. Computers & Digital Techniques, Vol. 146, No. 5, pp. 259-263, September 1999.
-
(1999)
IEE Proc. Computers & Digital Techniques
, vol.146
, Issue.5
, pp. 259-263
-
-
Sun, H.-M.1
Lee, N.-Y.2
Hwang, T.3
-
19
-
-
0000064722
-
Threshold proxy signature schemes
-
Springer-Verlag
-
K. Zhang, "Threshold proxy signature schemes". In Proc. 1st International Information Security Workshop, ISW'97, LNCS 1396, Springer-Verlag, pp. 191-197, 1997.
-
(1997)
Proc. 1st International Information Security Workshop, ISW'97, LNCS 1396
, pp. 191-197
-
-
Zhang, K.1
|