Login
Register
Home
Issues
Volume 21, Issue 1 (2010)
Identity-Based Threshold Proxy Signature ...
Informatica
Information
Submit your article
For Referees
Help
ATTENTION!
Article info
Related articles
Cited by
More
Article info
Related articles
Cited by
Cited by
9
Identity-Based Threshold Proxy Signature from Bilinear Pairings
A Traceable Certificateless Threshold Proxy Signature Scheme from Bilinear Pairings
Tao Yang, Hu Xiong, Jianbin Hu, Yonggang Wang, Yong Deng, Biao Xiao, Zhong Chen
https://doi.org/10.1007/978-3-642-20291-9_39
Book:
Lecture Notes in Computer Science (Web Technologies and Applications)
Volume 6612 (2011), p. 376
Design of ECSEPP: Elliptic Curve Based Secure E-cash Payment Protocol
Aditya Bhattacharyya, S. K. Setua
https://doi.org/10.1007/978-81-322-2529-4_35
Book:
Smart Innovation, Systems and Technologies (Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics)
Volume 44 (2016), p. 337
k-time Proxy Signature: Formal Definition and Efficient Construction
Weiwei Liu, Guomin Yang, Yi Mu, Jiannan Wei
https://doi.org/10.1007/978-3-642-41227-1_9
Book:
Lecture Notes in Computer Science (Provable Security)
Volume 8209 (2013), p. 154
2012 International Conference on Information Security and Intelligent Control
Yingying Qiao, Xiaonan Jiang, Hao Wen Lin, Jeng-Shyang Pan
https://doi.org/10.1109/ISIC.2012.6449706
Conference:
(2012), p. 53
2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications
Minghui Zheng, Yongquan Cui, Liang Chen
https://doi.org/10.1109/TrustCom.2013.83
Conference:
(2013), p. 683
Auditable Anonymous Electronic Examination
Ádám Vécsi, Attila Pethő
https://doi.org/10.3390/cryptography8020019
Journal:
Cryptography
Volume 8, Issue 2 (2024), p. 19
Compact Genetic Algorithms using belief vectors
Joon-Yong Lee, Min-Soeng Kim, Ju-Jang Lee
https://doi.org/10.1016/j.asoc.2011.01.010
Journal:
Applied Soft Computing
Volume 11, Issue 4 (2011), p. 3385
Secure proxy signature schemes from the Weil pairing
Bing-Chang Chen, Her-Tyan Yeh
https://doi.org/10.1007/s11227-012-0760-3
Journal:
The Journal of Supercomputing
Volume 65, Issue 2 (2013), p. 496
Security Vulnerability in Identity-Based Public Key Cryptosystems from Pairings
Jyh-Haw Yeh
https://doi.org/10.7763/IJIET.2013.V3.319
Journal:
International Journal of Information and Education Technology
(2013), p. 466
Export citation
Copy and paste formatted citation
Formatted citation
Placeholder
Citation style
AMS -- Americal Mathematical Society
APA -- American Psychological Association 6th ed.
Chicago -- The Chicago Manual of Style 17th ed.
Download citation in file
Export format
BibTeX
RIS
Authors
Placeholder
Share
RSS
To top