Cited by 9
Identity-Based Threshold Proxy Signature from Bilinear Pairings

A Traceable Certificateless Threshold Proxy Signature Scheme from Bilinear Pairings
Tao Yang, Hu Xiong, Jianbin Hu, Yonggang Wang, Yong Deng, Biao Xiao, Zhong Chen
Book:  Lecture Notes in Computer Science (Web Technologies and Applications) Volume 6612 (2011), p. 376
Design of ECSEPP: Elliptic Curve Based Secure E-cash Payment Protocol
Aditya Bhattacharyya, S. K. Setua
Book:  Smart Innovation, Systems and Technologies (Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics) Volume 44 (2016), p. 337
k-time Proxy Signature: Formal Definition and Efficient Construction
Weiwei Liu, Guomin Yang, Yi Mu, Jiannan Wei
Book:  Lecture Notes in Computer Science (Provable Security) Volume 8209 (2013), p. 154
2012 International Conference on Information Security and Intelligent Control
Yingying Qiao, Xiaonan Jiang, Hao Wen Lin, Jeng-Shyang Pan
Conference:  (2012), p. 53
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Minghui Zheng, Yongquan Cui, Liang Chen
Conference:  (2013), p. 683
Auditable Anonymous Electronic Examination
Ádám Vécsi, Attila Pethő
Journal:  Cryptography Volume 8, Issue 2 (2024), p. 19
Compact Genetic Algorithms using belief vectors
Joon-Yong Lee, Min-Soeng Kim, Ju-Jang Lee
Journal:  Applied Soft Computing Volume 11, Issue 4 (2011), p. 3385
Secure proxy signature schemes from the Weil pairing
Bing-Chang Chen, Her-Tyan Yeh
Journal:  The Journal of Supercomputing Volume 65, Issue 2 (2013), p. 496
Security Vulnerability in Identity-Based Public Key Cryptosystems from Pairings
Jyh-Haw Yeh
Journal:  International Journal of Information and Education Technology (2013), p. 466