-
1
-
-
55949088433
-
A secure identity-based proxy multi-signature scheme
-
Cao F., and Cao Z. A secure identity-based proxy multi-signature scheme. Information Sciences 179 (2009) 292-302
-
(2009)
Information Sciences
, vol.179
, pp. 292-302
-
-
Cao, F.1
Cao, Z.2
-
2
-
-
56649114655
-
An RSA-based (t, n) threshold proxy signature scheme with freewill identities
-
Chang Y., and Chang C. An RSA-based (t, n) threshold proxy signature scheme with freewill identities. International Journal of Information and Computer Security 1 1/2 (2007) 201-209
-
(2007)
International Journal of Information and Computer Security
, vol.1
, Issue.1-2
, pp. 201-209
-
-
Chang, Y.1
Chang, C.2
-
3
-
-
49849102704
-
Efficient generic on-line/off-line (threshold) signatures without key exposure
-
Chen X., Zhang F., Tian H., Wei B., Susilo W., Mu Y., Lee H., and Kim K. Efficient generic on-line/off-line (threshold) signatures without key exposure. Information Sciences 178 (2008) 4192-4203
-
(2008)
Information Sciences
, vol.178
, pp. 4192-4203
-
-
Chen, X.1
Zhang, F.2
Tian, H.3
Wei, B.4
Susilo, W.5
Mu, Y.6
Lee, H.7
Kim, K.8
-
4
-
-
84949751564
-
Security for Mobile Agents: Authentication and State Appraisal
-
W. Farmer, J. Gutmann and V. Swarup, in: Security for Mobile Agents: Authentication and State Appraisal, LNCS, vol. 1146, 1996, pp. 118-130.
-
(1996)
LNCS
, vol.1146
, pp. 118-130
-
-
Farmer, W.1
Gutmann, J.2
Swarup, V.3
-
5
-
-
0035451175
-
New nonrepudiable threshold proxy signature scheme with known signers
-
Hsu C., Wu T., and Wong D. New nonrepudiable threshold proxy signature scheme with known signers. Journal of Systems and Software 58 (2001) 119-124
-
(2001)
Journal of Systems and Software
, vol.58
, pp. 119-124
-
-
Hsu, C.1
Wu, T.2
Wong, D.3
-
6
-
-
33644688053
-
A novel efficient (t, n) threshold proxy signature scheme
-
Huang H., and Chang C. A novel efficient (t, n) threshold proxy signature scheme. Information Sciences 176 (2006) 1338-1349
-
(2006)
Information Sciences
, vol.176
, pp. 1338-1349
-
-
Huang, H.1
Chang, C.2
-
7
-
-
0242410360
-
A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem
-
Hwang M., Lu J., and Lin L. A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem. IEEE Transactions on Knowledge and data Engineering 15 6 (2003) 1552-1560
-
(2003)
IEEE Transactions on Knowledge and data Engineering
, vol.15
, Issue.6
, pp. 1552-1560
-
-
Hwang, M.1
Lu, J.2
Lin, L.3
-
8
-
-
0010567510
-
Proxy signatures, revisited
-
ICICS'97
-
S. Kim, S. Park, D. Won, Proxy signatures, revisited, in: ICICS'97, LNCS, vol 1334, 1997, pp. 223-232.
-
(1997)
LNCS
, vol.1334
, pp. 223-232
-
-
Kim, S.1
Park, S.2
Won, D.3
-
9
-
-
0003389059
-
-
P. Kotzanikolaous, G. Katsirelos, V. Chrissikopoulos, in: Mobile Agents for Secure Electronic Transactions, Recent Advances in Signal Processing and Communications, 1999, pp. 363-368.
-
(1999)
Mobile Agents for Secure Electronic Transactions, Recent Advances in Signal Processing and Communications
, pp. 363-368
-
-
Kotzanikolaous, P.1
Katsirelos, G.2
Chrissikopoulos, V.3
-
10
-
-
33646770684
-
A modified (t, n) threshold proxy signature scheme based on the RSA cryptosystem
-
W. Kuo, M. Chen, A modified (t, n) threshold proxy signature scheme based on the RSA cryptosystem, in: ICITA'05, 2005.
-
(2005)
ICITA'05
-
-
Kuo, W.1
Chen, M.2
-
11
-
-
1642614187
-
Strong proxy signature and its applications
-
B. Lee, H. Kim, K. Kim, Strong proxy signature and its applications, In SCIS'01, vol. 2/2, 2001, pp. 603-608.
-
(2001)
SCIS'01
, vol.2
, Issue.2
, pp. 603-608
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
12
-
-
84958751721
-
Secure mobile agent using strong non-designated proxy signature
-
ACISP '01
-
B. Lee, H. Kim, K. Kim, Secure mobile agent using strong non-designated proxy signature, in: ACISP '01, LNCS, vol. 2119, 2001, pp.474-486.
-
(2001)
LNCS
, vol.2119
, pp. 474-486
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
13
-
-
35748948981
-
New (t, n) threshold directed signature scheme with provable security
-
Lu R., Lin X., Cao Z., Shao J., and Liang X. New (t, n) threshold directed signature scheme with provable security. Information Sciences 178 (2008) 756-765
-
(2008)
Information Sciences
, vol.178
, pp. 756-765
-
-
Lu, R.1
Lin, X.2
Cao, Z.3
Shao, J.4
Liang, X.5
-
14
-
-
0030231965
-
Proxy signature: Delegation of the power to sign message
-
September
-
M. Mambo, K. Usuda, E. Okamoto, Proxy signature: delegation of the power to sign message, in: IEICE Transactions on Fundamentals, vol. E79-a, no. 9, September 1996, pp. 1338-1353.
-
(1996)
IEICE Transactions on Fundamentals
, vol.E79-a
, Issue.9
, pp. 1338-1353
-
-
Mambo, M.1
Usuda, K.2
Okamoto, E.3
|