Login
Register
Home
Issues
Volume 21, Issue 1 (2010)
Identity-Based Threshold Proxy Signature ...
Informatica
Information
Submit your article
For Referees
Help
ATTENTION!
Article info
Related articles
Cited by
More
Article info
Related articles
Cited by
Cited by
9
Identity-Based Threshold Proxy Signature from Bilinear Pairings
2012 International Conference on Information Security and Intelligent Control
Yingying Qiao, Xiaonan Jiang, Hao Wen Lin, Jeng-Shyang Pan
https://doi.org/10.1109/ISIC.2012.6449706
Conference
(2012), p. 53
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Minghui Zheng, Yongquan Cui, Liang Chen
https://doi.org/10.1109/TrustCom.2013.83
Conference
(2013), p. 683
A Traceable Certificateless Threshold Proxy Signature Scheme from Bilinear Pairings
Tao Yang, Hu Xiong, Jianbin Hu, Yonggang Wang, Yong Deng, Biao Xiao, Zhong Chen
https://doi.org/10.1007/978-3-642-20291-9_39
Book
Lecture Notes in Computer Science (Web Technologies and Applications)
Volume 6612 (2011), p. 376
Auditable Anonymous Electronic Examination
Ádám Vécsi, Attila Pethő
https://doi.org/10.3390/cryptography8020019
Journal
Cryptography
Volume 8, Issue 2 (2024), p. 19
Compact Genetic Algorithms using belief vectors
Joon-Yong Lee, Min-Soeng Kim, Ju-Jang Lee
https://doi.org/10.1016/j.asoc.2011.01.010
Journal
Applied Soft Computing
Volume 11, Issue 4 (2011), p. 3385
Design of ECSEPP: Elliptic Curve Based Secure E-cash Payment Protocol
Aditya Bhattacharyya, S. K. Setua
https://doi.org/10.1007/978-81-322-2529-4_35
Book
Smart Innovation, Systems and Technologies (Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics)
Volume 44 (2016), p. 337
Secure proxy signature schemes from the Weil pairing
Bing-Chang Chen, Her-Tyan Yeh
https://doi.org/10.1007/s11227-012-0760-3
Journal
The Journal of Supercomputing
Volume 65, Issue 2 (2013), p. 496
Security Vulnerability in Identity-Based Public Key Cryptosystems from Pairings
Jyh-Haw Yeh
https://doi.org/10.7763/IJIET.2013.V3.319
Journal
International Journal of Information and Education Technology
(2013), p. 466
k-time Proxy Signature: Formal Definition and Efficient Construction
Weiwei Liu, Guomin Yang, Yi Mu, Jiannan Wei
https://doi.org/10.1007/978-3-642-41227-1_9
Book
Lecture Notes in Computer Science (Provable Security)
Volume 8209 (2013), p. 154
Export citation
Copy and paste formatted citation
Formatted citation
Placeholder
Citation style
AMS -- Americal Mathematical Society
APA -- American Psychological Association 6th ed.
Chicago -- The Chicago Manual of Style 17th ed.
Download citation in file
Export format
BibTeX
RIS
Authors
Placeholder
Share
RSS
To top