2009 Fourth International Conference on Communications and Networking in China
Fengying Li, Jiping Zhang, Qingshui Xue, Zhenfu Cao
2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
Qingshui Xue, Zhenfu Cao, Fengying Li
Conference
(2010),
p. V9-422
A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme
Fengying Li, Qingshui Xue, Jiping Zhang, Zhenfu Cao
Book
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Collaborative Computing: Networking, Applications and Worksharing)
Volume 10
(2009),
p. 416
A Proxy Signature Based on the Difficulty of Solving Equations of Higher on Quaternion Ring
Hui Shao, Fan Zhang, Xiao Zhuan Yuan, Chuan Da Qi
Journal
Applied Mechanics and Materials
Volume 513-517
(2014),
p. 1951
A Threshold Proxy Signature Scheme Using Self-Certified Public Keys
Book
Lecture Notes in Computer Science (Parallel and Distributed Processing and Applications)
Volume 3358
(2004),
p. 715
A survey on lattice-based digital signature
Fengxia Liu, Zhiyong Zheng, Zixian Gong, Kun Tian, Yi Zhang, Zhe Hu, Jia Li, Qun Xu
Journal
Cybersecurity
Volume 7,
Issue 1
(2024)
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System
Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian
Book
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Security and Privacy in Mobile Information and Communication Systems)
Volume 17
(2009),
p. 58
Analysis on a Non-repudiable Threshold Proxy Signature Scheme with Known Signers
Gang Li, Yanling Li, Chuanda Qi
Book
Lecture Notes in Computer Science (Advances in Neural Networks – ISNN 2009)
Volume 5552
(2009),
p. 904
Analysis on the generalization of proxy signature
Namita Tiwari, Sahadeo Padhye
Journal
Security and Communication Networks
Volume 6,
Issue 5
(2013),
p. 549
Fourth International Conference on Information Technology (ITNG'07)
Fengying Li, Qingshui Xue, Zhenfu Cao
Conference
(2007),
p. 815
IEEE Conference on Cybernetics and Intelligent Systems, 2004.
Conference
(2004),
p. 1386
Improvement of Tzeng et al.’s nonrepudiable threshold proxy signature scheme with known signers
Journal
Applied Mathematics and Computation
Volume 168,
Issue 2
(2005),
p. 776
Improvement of nonrepudiable threshold multi-proxy threshold multi-signature scheme with shared verification
Qi Xie, Jilin Wang, Xiuyuan Yu
Journal
Journal of Electronics (China)
Volume 24,
Issue 6
(2007),
p. 806
Improvement on Hwang et al.’s generalization of proxy signature schemes based on elliptic curves
Shin-Jia Hwang, Chia-Wei Huang
Journal
Applied Mathematics and Computation
Volume 170,
Issue 2
(2005),
p. 941
Improvement on Li et al.'s generalization of proxy signature schemes
Shin-Jia Hwang, Ching-Chung Chan
Journal
Computers & Security
Volume 23,
Issue 7
(2004),
p. 615
Multi-proxy Multi-signature Binding Positioning Protocol
Huafeng Chen, Qingshui Xue, Fengying Li, Huajun Zhang, Zhenfu Cao, Jianwen Hou
Book
Lecture Notes in Computer Science (Wireless Algorithms, Systems, and Applications)
Volume 9204
(2015),
p. 9
Multi-proxy multi-signature binding positioning protocol
Qingshui Xue, Fengying Li, Huafeng Chen, Huajun Zhang, Zhenfu Cao
Journal
Security and Communication Networks
Volume 9,
Issue 16
(2016),
p. 3868
The Fourth International Conference onComputer and Information Technology, 2004. CIT '04.
Conference
(2004),
p. 450
Two Improved Proxy Multi-signature Schemes Based on the Elliptic Curve Cryptosystem
Fengying Li, Qingshui Xue
Book
Communications in Computer and Information Science (Computing and Intelligent Systems)
Volume 234
(2011),
p. 101