2009 Fourth International Conference on Communications and Networking in China
Fengying Li, Jiping Zhang, Qingshui Xue, Zhenfu Cao
2010 International Conference on Computer Application and System Modeling (ICCASM 2010)
Qingshui Xue, Zhenfu Cao, Fengying Li
Conference
(2010),
p. V9-422
A Model of Bilinear-Pairings Based Designated-Verifier Proxy Signatue Scheme
Fengying Li, Qingshui Xue, Jiping Zhang, Zhenfu Cao
Book
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Collaborative Computing: Networking, Applications and Worksharing)
Volume 10
(2009),
p. 416
A New Nonrepudiable Threshold Proxy Signature Scheme with Valid Delegation Period
Min-Shiang Hwang, Shiang-Feng Tzeng, Chun-Ta Li
Book
Lecture Notes in Computer Science (Computational Science and Its Applications – ICCSA 2007)
Volume 4707
(2007),
p. 273
A Threshold Proxy Signature Scheme Using Self-Certified Public Keys
Book
Lecture Notes in Computer Science (Parallel and Distributed Processing and Applications)
Volume 3358
(2004),
p. 715
An ECDLP-Based Threshold Proxy Signature Scheme Using Self-Certified Public Key System
Qingshui Xue, Fengying Li, Yuan Zhou, Jiping Zhang, Zhenfu Cao, Haifeng Qian
Book
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering (Security and Privacy in Mobile Information and Communication Systems)
Volume 17
(2009),
p. 58
Analysis and Design of Protocol for Enhanced Threshold Proxy Signature Scheme Based on RSA for Known Signers
Raman Kumar, Harsh Kumar Verma, Renu Dhir
Journal
Wireless Personal Communications
Volume 80,
Issue 3
(2015),
p. 1281
Comments on "A practical (t, n) threshold proxy signature scheme based on the RSA cryptosystem"
G. Wang, F. Bao, J. Zhou, R.H. Deng
Journal
IEEE Transactions on Knowledge and Data Engineering
Volume 16,
Issue 10
(2004),
p. 1309
Cryptanalysis of Protocol for Enhanced Threshold Proxy Signature Scheme Based on Elliptic Curve Cryptography for Known Signers
Fourth International Conference on Information Technology (ITNG'07)
Fengying Li, Qingshui Xue, Zhenfu Cao
Conference
(2007),
p. 815
Multi-proxy Multi-signature Binding Positioning Protocol
Huafeng Chen, Qingshui Xue, Fengying Li, Huajun Zhang, Zhenfu Cao, Jianwen Hou
Book
Lecture Notes in Computer Science (Wireless Algorithms, Systems, and Applications)
Volume 9204
(2015),
p. 9
Multi-proxy multi-signature binding positioning protocol
Qingshui Xue, Fengying Li, Huafeng Chen, Huajun Zhang, Zhenfu Cao
Journal
Security and Communication Networks
Volume 9,
Issue 16
(2016),
p. 3868
Visual secret sharing for multiple secrets
Jen-Bang Feng, Hsien-Chu Wu, Chwei-Shyong Tsai, Ya-Fen Chang, Yen-Ping Chu
Journal
Pattern Recognition
Volume 41,
Issue 12
(2008),
p. 3572