-
2
-
-
34249323356
-
On the security of a threshold proxy signature scheme using self-certified public keys
-
In the, Higher Education Press of China. Dec. 15-17, Beijing
-
L. F. Guo, G. L. Wang and B. Feng, "On the security of a threshold proxy signature scheme using self-certified public keys," In the Proc. of SKLOIS conference on information security and cryptology (CISC 2005), Higher Education Press of China. Dec. 15-17, 2005, Beijing.
-
(2005)
Proc. of SKLOIS conference on information security and cryptology (CISC 2005)
-
-
Guo, L.F.1
Wang, G.L.2
Feng, B.3
-
4
-
-
0035451175
-
-
C. L. Hsu, T.-S. Wu and T.-C. Wu, New nonrepudiable threshold proxy signature scheme with known signers, The Journal of Systems and Software 58(2001), pp. 119-124, 2001.
-
C. L. Hsu, T.-S. Wu and T.-C. Wu, "New nonrepudiable threshold proxy signature scheme with known signers," The Journal of Systems and Software 58(2001), pp. 119-124, 2001.
-
-
-
-
5
-
-
24944436522
-
Convertible nominative signatures
-
Proc. of Information Security and Privacy ACISP'04, Springer-Verlag
-
Z. Huang and Y. Wang, "Convertible nominative signatures," in Proc. of Information Security and Privacy (ACISP'04), LNCS 3108, pp. 348-357, Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3108
, pp. 348-357
-
-
Huang, Z.1
Wang, Y.2
-
6
-
-
0242410360
-
A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
-
Nov/Dec
-
M. S. Hwang, J. L Lu and L. C. Lin, "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem," IEEE Trans. on Knowledge and Data Engineering, Vol. 15, No. 6, Nov/Dec 2003.
-
(2003)
IEEE Trans. on Knowledge and Data Engineering
, vol.15
, Issue.6
-
-
Hwang, M.S.1
Lu, J.L.2
Lin, L.C.3
-
7
-
-
0010567510
-
Proxy Signatures, revisited
-
Proceedings of ICICS'97, Springer-Verlag
-
S. J. Kim, S. J. Park, D. H. Won, "Proxy Signatures, revisited," in the Proceedings of ICICS'97, Lecture Notes in Computer Science 1334, pp. 223-232, Springer-Verlag.
-
Lecture Notes in Computer Science
, vol.1334
, pp. 223-232
-
-
Kim, S.J.1
Park, S.J.2
Won, D.H.3
-
8
-
-
1642614187
-
Strong proxy signature and its applications
-
B. Lee, H. Kim, and K. Kim, "Strong proxy signature and its applications," in the Proceedings of SCIS2001, pp. 603-608, 2001.
-
(2001)
Proceedings of SCIS2001
, pp. 603-608
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
9
-
-
0029717329
-
Proxy signatures for delegating signing operation
-
ACM Press
-
M. Mambo, K. Usuda and E. Okamoto, "Proxy signatures for delegating signing operation," in Proc. 3rd ACM Conference on Computer and Communications Security, ACM Press, 1996, pp. 48-57.
-
(1996)
Proc. 3rd ACM Conference on Computer and Communications Security
, pp. 48-57
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
10
-
-
34249285867
-
Nonrepudiable threshold proxy signatures with tracebility property
-
S. H. Nagore and M. R. Sekhar, "Nonrepudiable threshold proxy signatures with tracebility property," Far East Journal of Applied Mathematics, Vol. 6(3), pp. 233-240, 2002.
-
(2002)
Far East Journal of Applied Mathematics
, vol.6
, Issue.3
, pp. 233-240
-
-
Nagore, S.H.1
Sekhar, M.R.2
-
11
-
-
26444603424
-
Proactive two-party signatures for user authentication
-
The Internet Society
-
A. Nicolosi, M. Krohn, Y. Dodis, and D. Mazieres, "Proactive two-party signatures for user authentication," in the Proc. of 10th Annual Network and Distributed System Security Symposium (NDSS'03), The Internet Society, 2003.
-
(2003)
Proc. of 10th Annual Network and Distributed System Security Symposium (NDSS'03)
-
-
Nicolosi, A.1
Krohn, M.2
Dodis, Y.3
Mazieres, D.4
-
12
-
-
84956995852
-
A digital nominative proxy signature scheme for mobile communication
-
Proc. of ICICS 2001, International Conference on Information and Communications Security, Springer-Verlag
-
H. U. Park and I. Y. Lee, "A digital nominative proxy signature scheme for mobile communication," in the Proc. of ICICS 2001, International Conference on Information and Communications Security, Springer-Verlag, Lecture Notes in Computer Science 2229, pp.451-455, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2229
, pp. 451-455
-
-
Park, H.U.1
Lee, I.Y.2
-
13
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. Schnorr, "Efficient signature generation by smart cards," Journal of Cryptography 4(3), pp. 161-174, 1991.
-
(1991)
Journal of Cryptography
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.1
-
14
-
-
3042606448
-
New nominative proxy signature scheme for mobile communication
-
ISBN: 80-85960-50-8, pp
-
S. H Seo and S. H. Lee, "New nominative proxy signature scheme for mobile communication," in the Proc. of SPI'2003, Security and Protection of Information, ISBN: 80-85960-50-8, pp. 149-154, 2003.
-
(2003)
Proc. of SPI'2003, Security and Protection of Information
, pp. 149-154
-
-
Seo, S.H.1
Lee, S.H.2
-
15
-
-
0032670844
-
An efficient nonrepudiable threshold proxy signatures with known signers
-
H. M. Sun, "An efficient nonrepudiable threshold proxy signatures with known signers," Computer Communications 22(8), 1999, pp. 717-722.
-
(1999)
Computer Communications
, vol.22
, Issue.8
, pp. 717-722
-
-
Sun, H.M.1
-
16
-
-
0033354258
-
Threshold proxy signatures
-
IEEE Press
-
H. Sun, N. Y. Lee, and T. Hwang, "Threshold proxy signatures," IEEE Proceedings-Computes and Digital Technique, Vol. 146, IEEE Press, 1999, pp. 259-263.
-
(1999)
IEEE Proceedings-Computes and Digital Technique
, vol.146
, pp. 259-263
-
-
Sun, H.1
Lee, N.Y.2
Hwang, T.3
-
17
-
-
26444601090
-
On the security of nominative signatures
-
Proc. Of Information Security and Privacy ACISP'05, Springer-Verlag
-
W. Susilo and Y. Mu, "On the security of nominative signatures," in the Proc. Of Information Security and Privacy (ACISP'05), LNCS 3547, pp. 329-335, Springer-Verlag, 2005.
-
(2005)
LNCS
, vol.3547
, pp. 329-335
-
-
Susilo, W.1
Mu, Y.2
-
21
-
-
1542335453
-
An improvement of nonrepudiable threshold proxy signature scheme with known signers
-
S. F. Tzeng, M. S. Hwang, and C. Y. Yang, "An improvement of nonrepudiable threshold proxy signature scheme with known signers," Computers and Security 23, 2004, pp. 174-178.
-
(2004)
Computers and Security
, vol.23
, pp. 174-178
-
-
Tzeng, S.F.1
Hwang, M.S.2
Yang, C.Y.3
-
23
-
-
13844266307
-
Comments on a threshold proxy signature scheme based on the RSA cryptosystem
-
October
-
G. Wang, F. Bao, J. Zhou, and R. H. Deng. "Comments on a threshold proxy signature scheme based on the RSA cryptosystem," IEEE Trans. On Knowledge and Data Engineering, Vol 16, No. 10, October 2004.
-
(2004)
IEEE Trans. On Knowledge and Data Engineering
, vol.16
, Issue.10
-
-
Wang, G.1
Bao, F.2
Zhou, J.3
Deng, R.H.4
-
24
-
-
33744898762
-
A threshold proxy signature scheme using self certified public keys
-
Parallel and Distributed Processing Applications: 2nd International Symposium ISPA 2004, Springer-Verlag
-
Q. S. Xue and Z. F. Cao, "A threshold proxy signature scheme using self certified public keys," Parallel and Distributed Processing Applications: 2nd International Symposium ISPA 2004, LNCS, Vol. 3358, pp. 715-724, Springer-Verlag 2004.
-
(2004)
LNCS
, vol.3358
, pp. 715-724
-
-
Xue, Q.S.1
Cao, Z.F.2
-
25
-
-
24644515598
-
On the efficiency of nonrepudiable threshold proxy signature scheme with known signers
-
C. Y. Yang, S. F. Tzeng and M. S. Hwang, "On the efficiency of nonrepudiable threshold proxy signature scheme with known signers," The Journal of Systems and Software 22(9), 2003, pp. 1-8.
-
(2003)
The Journal of Systems and Software
, vol.22
, Issue.9
, pp. 1-8
-
-
Yang, C.Y.1
Tzeng, S.F.2
Hwang, M.S.3
-
26
-
-
0000064722
-
Threshold proxy signature schemes
-
Japan, pp
-
K. Zhang, "Threshold proxy signature schemes," in the Proc of Information Security Workshop, Japan, pp. 191-197, 1997.
-
(1997)
Proc of Information Security Workshop
, pp. 191-197
-
-
Zhang, K.1
-
27
-
-
26044456799
-
An improved nominative proxy signature for mobile communication
-
July
-
K. Zhang, "An improved nominative proxy signature for mobile communication," IEICE Transactions on information and Systems, Vol. E88-D, No. 7, July 2005, pp. 1697-1699.
-
(2005)
IEICE Transactions on information and Systems
, vol.E88-D
, Issue.7
, pp. 1697-1699
-
-
Zhang, K.1
|