-
1
-
-
84946840347
-
Short Signatures from the Weil Pairiing
-
Proceedings of Asiacrypt 2001, Springer-Verlag
-
D.Boneh, B. Lynn and H. Shacham. Short Signatures from the Weil Pairiing. In Proceedings of Asiacrypt 2001, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2248, pp. 514-532, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2248
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
3
-
-
0141444234
-
A new proxy multi-signature scheme
-
Tamkang University, Taipei, Taiwan, Sep. 26-28
-
S. J. Hwang and C. C. Chen. A new proxy multi-signature scheme. In International workshop on cryptology and network security, Tamkang University, Taipei, Taiwan, Sep. 26-28, 2001.
-
(2001)
International Workshop on Cryptology and Network Security
-
-
Hwang, S.J.1
Chen, C.C.2
-
5
-
-
84958968002
-
Secure transactions with mobile agent in hostile environments
-
Proc. ACISP 2000, Springer-Verlag
-
P. Kotzanikolaous, M.Burmester, and V. Chrisskopoulos. Secure transactions with mobile agent in hostile environments. In Proc. ACISP 2000, Lecture Notes in Computer Science 1841, Springer-Verlag, pp. 289-297, 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.1841
, pp. 289-297
-
-
Kotzanikolaous, P.1
Burmester, M.2
Chrisskopoulos, V.3
-
6
-
-
3042688872
-
Secrets for mobile agent using one-time proxy signature
-
H. Kim, J. Baek, B. Lee, and K. Kim. Secrets for mobile agent using one-time proxy signature. Cryptography and Information Security 2001, Vol 2/2, pp. 845-850, 2001.
-
(2001)
Cryptography and Information Security 2001
, vol.2
, Issue.2
, pp. 845-850
-
-
Kim, H.1
Baek, J.2
Lee, B.3
Kim, K.4
-
7
-
-
0010567510
-
Proxy Signatures, revisited
-
ICICS'97, Springer-Verlag
-
S. J. Kim, S. J. Park, D. H. Won. Proxy Signatures, revisited. ICICS'97, Lecture Notes in Computer Science 1334, pp. 223-232, Springer-Verlag.
-
Lecture Notes in Computer Science
, vol.1334
, pp. 223-232
-
-
Kim, S.J.1
Park, S.J.2
Won, D.H.3
-
8
-
-
3142736051
-
A security personal learning tools using a proxy blind signature scheme
-
W.D. Lin and J.K. Jan. A security personal learning tools using a proxy blind signature scheme. In Pro. of International Conference on Chinese Language Computing, Illinois, USA, July 2000, pp. 273-277, 2000.
-
Pro. of International Conference on Chinese Language Computing, Illinois, USA, July 2000
, vol.2000
, pp. 273-277
-
-
Lin, W.D.1
Jan, J.K.2
-
9
-
-
1642614187
-
Strong proxy signgture and its applications
-
B. Lee, H. Kim, and K. Kim. Strong proxy signgture and its applications. In Proceedings of SCIS, 2001, pp. 603-608.
-
(2001)
Proceedings of SCIS
, pp. 603-608
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
10
-
-
84958751721
-
Secure mobile agent using strong non-designated proxy signature
-
B. Lee, H. Kim, and K. Kim. Secure mobile agent using strong non-designated proxy signature. In Proc. ACISP 2001, pp. 474-486.
-
(2001)
Proc. ACISP
, pp. 474-486
-
-
Lee, B.1
Kim, H.2
Kim, K.3
-
12
-
-
84956995852
-
A digital nominative proxy signature scheme for mobile communications
-
ICICS 2001, Springer-Verlag
-
H.-U. Park and L.-Y. Lee. A digital nominative proxy signature scheme for mobile communications. ICICS 2001, Lecture Notes in Computer Science 2229, Springer-Verlag, pp. 451-455, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2229
, pp. 451-455
-
-
Park, H.-U.1
Lee, L.-Y.2
-
13
-
-
0032670844
-
An efficient nonrepudiable threshold proxy signatures with known signers
-
H. M. Sun. An efficient nonrepudiable threshold proxy signatures with known signers. Computer Communications 22(8),1999, pp. 717-722.
-
(1999)
Computer Communications
, vol.22
, Issue.8
, pp. 717-722
-
-
Sun, H.M.1
-
16
-
-
0033354258
-
Threshold proxy signatures
-
IEEE Press
-
H. Sun, N. -Y. Lee, and T. Hwang. Threshold proxy signatures. In IEEE Proceedings-Computes and Digital Technique, Vol. 146, IEEE Press, 1999, pp. 259-263.
-
(1999)
IEEE Proceedings-Computes and Digital Technique
, vol.146
, pp. 259-263
-
-
Sun, H.1
Lee, N.Y.2
Hwang, T.3
-
17
-
-
1642602942
-
Proxy blind signature scheme based on DLP
-
2003
-
Z.-W.Tan, Z.-J. Liu. Proxy blind signature scheme based on DLP. Journal of Software, 2003/14, pp. 1931-1935, 2003.
-
(2003)
Journal of Software
, vol.14
, pp. 1931-1935
-
-
Tan, Z.-W.1
Liu, Z.-J.2
-
19
-
-
0345490608
-
Efficient One-time proxy signatures
-
Springer-Verlag
-
Huaxion Wang and Josef Pieprzyk. Efficient One-time proxy signatures. In ASIACRYPT 2003, pp. 507-522, 2004, Springer-Verlag.
-
ASIACRYPT 2003
, vol.2004
, pp. 507-522
-
-
Wang, H.1
Pieprzyk, J.2
|