-
2
-
-
0242406157
-
Designated-receiver proxy signature scheme for electronic commerce
-
Oct. 5-8. IEEE, 2003
-
J.-Z. Dai X.-H. Yang, and J.-X. Dong. Designated-receiver proxy signature scheme for electronic commerce. In: Proc. of IEEE International Conference on Systems, Man and Cybernetics, Vol. 1, pp. 384-389. Oct. 5-8, 2003. IEEE, 2003.
-
(2003)
Proc. of IEEE International Conference on Systems, Man and Cybernetics
, vol.1
, pp. 384-389
-
-
Dai, J.-Z.1
Yang, X.-H.2
Dong, J.-X.3
-
3
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
April
-
S. Goldwasser, S. Micali, and R. Rivest. A digital signature scheme secure against adaptive chosen-message attacks. SIAM Journal of Computing, April 1988, 17(2): 281-308.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
4
-
-
0010567510
-
Proxy signatures, revisited
-
LNCS 1334. Springer-Verlag
-
S. Kim, S. Park, and D. Won. Proxy signatures, revisited. In: Information and Communications Security (ICICS'97), LNCS 1334, pp. 223-232. Springer-Verlag, 1997.
-
(1997)
Information and Communications Security (ICICS'97)
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
5
-
-
84958751721
-
Secure mobile agent using strong nondesignated proxy signature
-
LNCS 2119. Springer-Verlag
-
B. Lee, H. Kim, and K. Kim. Secure mobile agent using strong nondesignated proxy signature. In: Information Security and Privacy (ACISP'OI), LNCS 2119, pp. 474-486. Springer-Verlag, 2001.
-
(2001)
Information Security and Privacy (ACISP'OI)
, pp. 474-486
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
6
-
-
35248866917
-
An analysis of proxy signatures: Is a secure channel necessary?
-
LNCS 2612. Springer-Verlag
-
J.-Y. Lee, J. H. Cheon, and S. Kim. An analysis of proxy signatures: Is a secure channel necessary? In: Topics in Cryptology - CT-RSA 2003, LNCS 2612, pp. 68-79. Springer-Verlag, 2003.
-
(2003)
Topics in Cryptology - CT-RSA 2003
, pp. 68-79
-
-
Lee, J.-Y.1
Cheon, J.H.2
Kim, S.3
-
7
-
-
0030231965
-
Proxy signature: Delegation of the power to sign messages
-
Sep.
-
M. Mambo, K. Usuda, and E. Okamoto proxy signature: Delegation of the power to sign messages. IEICE Trans. Fundamentals, Sep. 1996, Vol. E79-A, No. 9, pp. 1338-1353.
-
(1996)
IEICE Trans. Fundamentals
, vol.E79-A
, Issue.9
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
10
-
-
84956995852
-
A digital nominative proxy signature scheme for mobile communications
-
LNCS 2229. SpringerVerlag
-
H.-U. Park and I.-Y. Lee. A digital nominative proxy signature scheme for mobile communications. In: Information and Communications Security (ICICS'01), LNCS 2229, pp. 451-455. SpringerVerlag, 2001.
-
(2001)
Information and Communications Security (ICICS'01)
, pp. 451-455
-
-
Park, H.-U.1
Lee, I.-Y.2
-
11
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. Schnorr. Efficient signature generation by smart cards. Journal of Cryptography, 1991,4(3): 161-174.
-
(1991)
Journal of Cryptography
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.1
-
13
-
-
84945962241
-
Threshold proxy signature schemes
-
LNCS 1396. SpringerVerlag
-
K. Zhang. Threshold proxy signature schemes. In: Information Security Workshop (ISW'97), LNCS 1396, pp. 282-290. SpringerVerlag, 1997.
-
(1997)
Information Security Workshop (ISW'97)
, pp. 282-290
-
-
Zhang, K.1
|