Login
Register
Home
Issues
Volume 16, Issue 2 (2005)
Efficient Pairing-Based Threshold Proxy ...
Informatica
Information
Submit your article
For Referees
Help
ATTENTION!
Article info
Related articles
Cited by
More
Article info
Related articles
Cited by
Cited by
3
Efficient Pairing-Based Threshold Proxy Signature Scheme with Known Signers
Chao Wang, Yunpeng Han, Fagen Li
https://doi.org/10.1109/EBISS.2009.5138069
Journal:
(2009), p. 1
Security Analysis of Some Threshold Signature Schemes and Multi-signature Schemes
Tianjie Cao, Dongdai Lin
https://doi.org/10.1007/11599548_20
Book:
Lecture Notes in Computer Science (Information Security and Cryptology)
Volume 3822 (2005), p. 233
Certificateless threshold signcryption scheme with secret sharing mechanism
Huifang Yu, Shengbing Wang
https://doi.org/10.1016/j.knosys.2021.106981
Journal:
Knowledge-Based Systems
Volume 221 (2021), p. 106981
Export citation
Copy and paste formatted citation
Formatted citation
Placeholder
Citation style
AMS -- Americal Mathematical Society
APA -- American Psychological Association 6th ed.
Chicago -- The Chicago Manual of Style 17th ed.
Download citation in file
Export format
BibTeX
RIS
Authors
Placeholder
Share
RSS
To top