-
1
-
-
0025246897
-
A fair protocol for signing contracts
-
M. Ben-Or, O. Goldreich, S. Micali, and R.L. Rivest A fair protocol for signing contracts IEEE Transactions on Information Theory 36 1 1990 40 46
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.1
, pp. 40-46
-
-
Ben-Or, M.1
Goldreich, O.2
Micali, S.3
Rivest, R.L.4
-
3
-
-
0141518230
-
A secure nonrepudiable threshold proxy signature scheme with known signers
-
M.S. Hwang, I.C. Lin, and Eric J.L. Lu A secure nonrepudiable threshold proxy signature scheme with known signers International Journal of Informatica 11 2 2000 1 8
-
(2000)
International Journal of Informatica
, vol.11
, Issue.2
, pp. 1-8
-
-
Hwang, M.S.1
Lin, I.C.2
Lu Eric, J.L.3
-
4
-
-
0010567510
-
Proxy signatures, revisited
-
Proceedings of ICICS'97
-
S. Kim, S. Park, D. Won, Proxy signatures, revisited, in: Proceedings of ICICS'97, LNCS 1334, 1997, pp. 223-232.
-
(1997)
LNCS
, vol.1334
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
6
-
-
84956860632
-
On Zhang's nonrepudiable proxy signature schemes
-
ACISP'98
-
N.Y. Lee, T. Hwang, C.H. Wang, On Zhang's nonrepudiable proxy signature schemes, ACISP'98, LNCS 1438, 1998, pp. 415-422.
-
(1998)
LNCS
, vol.1438
, pp. 415-422
-
-
Lee, N.Y.1
Hwang, T.2
Wang, C.H.3
-
7
-
-
0030231965
-
Proxy signatures: Delegation of the power to sign message
-
M. Mambo, K. Usuda, and E. Okamoto Proxy signatures: delegation of the power to sign message IEICE Transactions on Fundamentals E79-A 9 1996 1338 1354
-
(1996)
IEICE Transactions on Fundamentals
, vol.E79-A
, Issue.9
, pp. 1338-1354
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
8
-
-
0029717329
-
Proxy signatures for delegating signing operation
-
M. Mambo, K. Usuda, E. Okamoto, Proxy signatures for delegating signing operation, in: Proceedings of the Third ACM Conference on Computer and Communications Security, 1996, pp. 48-57.
-
(1996)
Proceedings of the Third ACM Conference on Computer and Communications Security
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
10
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
Springer-Verlag
-
C.P. Schnorr Efficient identification and signatures for smart cards Advances in Cryptology: Crypto'89, LNCS 435 1990 Springer-Verlag 339 351
-
(1990)
Advances in Cryptology: Crypto'89, LNCS
, vol.435
, pp. 339-351
-
-
Schnorr, C.P.1
-
11
-
-
0032670844
-
An efficient nonrepudiable threshold proxy signature scheme with known signers
-
H.M. Sun An efficient nonrepudiable threshold proxy signature scheme with known signers Computer Communications 22 8 1999 717 722
-
(1999)
Computer Communications
, vol.22
, Issue.8
, pp. 717-722
-
-
Sun, H.M.1
-
13
-
-
2942594446
-
A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
-
S.F. Tzeng, C.Y. Yang, and M.S. Hwang A nonrepudiable threshold multi-proxy multi-signature scheme with shared verification Future Generation Computer Systems 20 5 2004 887 893
-
(2004)
Future Generation Computer Systems
, vol.20
, Issue.5
, pp. 887-893
-
-
Tzeng, S.F.1
Yang, C.Y.2
Hwang, M.S.3
-
14
-
-
0029752886
-
Proposal of an automatic signature scheme using a compiler
-
K. Usuda, M. Mambo, T. Uyematsu, and E. Okamoto Proposal of an automatic signature scheme using a compiler IEICE Transactions on Fundamentals E79-A 1 1996 94 101
-
(1996)
IEICE Transactions on Fundamentals
, vol.E79-A
, Issue.1
, pp. 94-101
-
-
Usuda, K.1
Mambo, M.2
Uyematsu, T.3
Okamoto, E.4
-
15
-
-
0026156775
-
An analysis of the proxy problem in distributed systems
-
V. Varabharajan, P. Allen, S. Black, An analysis of the proxy problem in distributed systems, in: Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy, 1991, pp. 225-275.
-
(1991)
Proceedings of the 1991 IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 225-275
-
-
Varabharajan, V.1
Allen, P.2
Black, S.3
|