-
3
-
-
84991872092
-
Schnorr signature scheme with restricted signing capability and its application
-
Choi C., Kim Z., and Kim K. Schnorr signature scheme with restricted signing capability and its application. Proc. of CSS'03 (2003)
-
(2003)
Proc. of CSS'03
-
-
Choi, C.1
Kim, Z.2
Kim, K.3
-
4
-
-
84949751564
-
Security for mobile agents: authentication and state appraisal
-
Farmer W., Gutmann J., and Swarup V. Security for mobile agents: authentication and state appraisal. LNCS vol. 1146 (1996) 118-130
-
(1996)
LNCS
, vol.1146
, pp. 118-130
-
-
Farmer, W.1
Gutmann, J.2
Swarup, V.3
-
5
-
-
21644483944
-
Digital signature schemes with restriction on signing capability
-
Hwang J., Kim H., Lee D., and Lim J. Digital signature schemes with restriction on signing capability. Proc. of ACISP 2003, LNCS vol. 2727 (2003) 324-335
-
(2003)
Proc. of ACISP 2003, LNCS
, vol.2727
, pp. 324-335
-
-
Hwang, J.1
Kim, H.2
Lee, D.3
Lim, J.4
-
6
-
-
0010567510
-
Proxy signatures, revisited
-
Kim S., Park S., and Won D. Proxy signatures, revisited. Proc. of ICICS'97, LNCS vol. 1334 (1997) 223-243
-
(1997)
Proc. of ICICS'97, LNCS
, vol.1334
, pp. 223-243
-
-
Kim, S.1
Park, S.2
Won, D.3
-
9
-
-
84958751721
-
Secure mobile agent using strong non-designated proxy signature
-
Lee B., Kim H., and Kim K. Secure mobile agent using strong non-designated proxy signature. ACISP '01, LNCS vol. 2119 (2001) 474-486
-
(2001)
ACISP '01, LNCS
, vol.2119
, pp. 474-486
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
10
-
-
54349106469
-
Security analysis and improvement of some proxy signature schemes
-
Li J., Zhang Y., and Zhu Y. Security analysis and improvement of some proxy signature schemes. Inn Conference '04 (Month 1-2, 2004)
-
(2004)
Inn Conference '04
-
-
Li, J.1
Zhang, Y.2
Zhu, Y.3
-
11
-
-
0030231965
-
Proxy signature: delegation of the power to sign message
-
Mambo M., Usuda K., and Okamoto E. Proxy signature: delegation of the power to sign message. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science E79-a No.9, sep. (1996) 1338-1353
-
(1996)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Science
, vol.E79-a
, Issue.9 sep
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
-
12
-
-
54349122654
-
Provably Secure Delegation-by-certification Proxy Signature Scheme
-
Tan Z., and Liu Z. Provably Secure Delegation-by-certification Proxy Signature Scheme. INFOSECU'04 (2004)
-
(2004)
INFOSECU'04
-
-
Tan, Z.1
Liu, Z.2
-
13
-
-
26444516527
-
A novel and secure non-designated proxy signature scheme for mobile agents
-
Zhang J., Zou J., and Wang Y. A novel and secure non-designated proxy signature scheme for mobile agents. ICCNMC 2005, LNCS vol. 3619 (2005) 836-844
-
(2005)
ICCNMC 2005, LNCS
, vol.3619
, pp. 836-844
-
-
Zhang, J.1
Zou, J.2
Wang, Y.3
-
14
-
-
33646675362
-
An efficient proxy-protected signature scheme based on factoring
-
Zhou Y., Cao Z., and Chai Z. An efficient proxy-protected signature scheme based on factoring. ISPA workshops 2005, LNCS vol. 3759 (2005) 332-341
-
(2005)
ISPA workshops 2005, LNCS
, vol.3759
, pp. 332-341
-
-
Zhou, Y.1
Cao, Z.2
Chai, Z.3
|