-
1
-
-
84949751564
-
Secutiy for mobile agents: Authentication and state appraisal
-
Springer-Verlag, Berlin Heidelberg New York
-
W.Farmer, J.Gutmann and V.Swarup,"Secutiy for Mobile Agents: Authentication and State Appraisal", Prof.of the European Symposium On Research in Computer Security Lecture Notes in Computer Science, Vol.1146. Springer-Verlag, Berlin Heidelberg New York (1996) 118-130.
-
(1996)
Prof.of the European Symposium on Research in Computer Security Lecture Notes in Computer Science
, vol.1146
, pp. 118-130
-
-
Farmer, F.1
Gutmann, J.2
Swarup, V.3
-
3
-
-
0030231965
-
Proxy signature: Delegation of the power to sign messages
-
Mambo, M., Usuda, K., and Okamoto, E. Proxy Signature: Delegation of the Power to Sign Messages. IEICE Transactions Fundamentals, E79-A(9): (1996) 1338-1353.
-
(1996)
IEICE Transactions Fundamentals
, vol.E79-A
, Issue.9
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
4
-
-
10644282065
-
A new proxy signature scheme with revocation"
-
Elsevier
-
Eric Jui-Lin Lu, Min-Shiang Hwang, Cheng-Jian Huang, "A new proxy signature scheme with revocation", Applied Mathematics and Computation 161, Elsevier, (2005) 799-806.
-
(2005)
Applied Mathematics and Computation
, vol.161
, pp. 799-806
-
-
Lu, E.J.-L.1
Hwang, M.-S.2
Huang, C.-J.3
-
5
-
-
26444608339
-
Secure mobile agent using strong non-designated proxy Signature
-
Springer-Verlag, Berlin Heidelberg New York
-
Byoungcheon Lee, Heesun Kim, and Kwangjo Kim,"Secure Mobile Agent using Strong Non-designated Proxy signature", ACISP2001 Lecture Notes in Computer Science, Vol.1446. Springer-Verlag, Berlin Heidelberg New York (2001) 145-157.
-
(2001)
ACISP2001 Lecture Notes in Computer Science
, vol.1446
, pp. 145-157
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
6
-
-
84927727752
-
Security proofs for signature schemes[C]
-
Eurocrypt'96, Springer-verlag
-
Pointcheval.D,and Stern.J, Security Proofs for Signature Schemes[C], In Eurocrypt'96, LNCS 1070, Springer-verlag, (1996) 387-398.
-
(1996)
LNCS
, vol.1070
, pp. 387-398
-
-
Pointcheval, D.1
Stern, J.2
-
7
-
-
84921018856
-
A practical and provably secure Coalition-Resistant group signature scheme
-
Advances in Cryptology-Proceedings of CRYPTO 2000
-
G. Ateniese and J. Camenisch and M. Joye and G. Tsudik, A practical and provably secure Coalition-Resistant group signature scheme, Advances in Cryptology-Proceedings of CRYPTO 2000, LNCS 1880, (2000) 255-270.
-
(2000)
LNCS
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
8
-
-
0008317070
-
Group signature schemes and payment systems based on the discrete logarithm problem
-
PhD thesis, Hartung-Gorre Verlag, Konstanz, ISBN 3-89649-286-1
-
J. Camenisch, Group signature schemes and payment systems based on the discrete logarithm problem, PhD thesis, vol. 2 of ETH-Series in Information Security an Cryptography, Hartung-Gorre Verlag, Konstanz, 1998, ISBN 3-89649-286-1.
-
(1998)
ETH-series in Information Security an Cryptography
, vol.2
-
-
Camenisch, J.1
-
9
-
-
3042542825
-
An improved nominative proxy signature scheme for mobile communication, 18th International conference on Advanced Information
-
J.H.Zhang,Q.H. Wu, J.L. Wang,Y.M. Wang, An improved nominative proxy signature scheme for mobile communication, 18th International conference on Advanced Information Networking and Applications, (2004), 23-26.
-
(2004)
Networking and Applications
, pp. 23-26
-
-
Zhang, J.H.1
Wu, Q.H.2
Wang, J.L.3
Wang, Y.M.4
-
10
-
-
84937570422
-
Self-certified public keys, Advances in Cryptology-Eurocrypt 1991
-
Springer-Verlag
-
M. Girault, Self-certified public keys, Advances in Cryptology-Eurocrypt 1991, LNCS 547, Springer-Verlag, (1991) 490-497.
-
(1991)
LNCS
, vol.547
, pp. 490-497
-
-
Girault, M.1
-
11
-
-
0037662012
-
A proxy-protected proxy signature scheme based on elliptic curve cryptosystem, TENCON 02. Proceedings
-
T.-S. Chen, T.-P. Liu and Y.-F. Chung, A proxy-protected proxy signature scheme based on elliptic curve cryptosystem, TENCON 02. Proceedings. 2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering, (2002) 184-187.
-
(2002)
2002 IEEE Region 10 Conference on Computers, Communications, Control and Power Engineering
, pp. 184-187
-
-
Chen, T.-S.1
Liu, T.-P.2
Chung, Y.-F.3
-
12
-
-
84927752554
-
Designated verifier proofs and their applications
-
Advances in Cryptology-eurocrypt 1996, Springer-Ver-lag
-
M. Jakobsson, K. Sako, and R. Impagliazzo, "Designated verifier proofs and their applications," Advances in Cryptology-Eurocrypt 1996, LNCS 1070, Springer-Ver-lag, (1996)143-154.
-
(1996)
LNCS
, vol.1070
, pp. 143-154
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
13
-
-
1642614187
-
Strong proxy signature and its applications
-
B. Lee, H. Kim and K. Kim. Strong proxy signature and its applications. In Proceedings of SCIS, (2001) 243-247.
-
(2001)
Proceedings of SCIS
, pp. 243-247
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
14
-
-
84957685616
-
A practical and provably secure scheme for publicly verifiable secret sharing and its applications
-
Advances in Cryptology-EUROCRYPT '98, Springer-Verlag
-
FUJISAKI, E. and OKAMOTO, T., A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications, Advances in Cryptology-EUROCRYPT '98, Lecture Notes in Computer Science, Vol. 1403, Springer-Verlag, (1998) pp. 32-46.
-
(1998)
Lecture Notes in Computer Science
, vol.1403
, pp. 32-46
-
-
Fujisaki, E.1
Okamoto, T.2
-
15
-
-
26444609473
-
Two modified nominative proxy signature schemes for mobile communication, 2005 IEEE networking
-
Tucson, Arizona, U.S.A
-
J.H Zhang, J.C Zou and Y.M Wang, Two Modified Nominative Proxy Signature Schemes for Mobile Communication, 2005 IEEE Networking, Sensing and Control Conference Proceedings, Tucson, Arizona, U.S.A, (2005) 1054-1058
-
(2005)
Sensing and Control Conference Proceedings
, pp. 1054-1058
-
-
Zhang, J.H.1
Zou, J.C.2
Wang, Y.M.3
|