共 16 条
[1]
[Anonymous], LECT NOTES COMPUTER
[3]
Improvement of threshold proxy signature scheme
[J].
Applied Mathematics and Computation (New York),
2003, 136 (2-3)
:315-321
[4]
Hwang M S, 2000, INT J INFORMATICA, V11, P1
[5]
KIM S, 1997, LECT NOTES COMPUTER, V1334, P223
[6]
Lee B, 2001, LECT NOTES COMPUT SC, V2119, P474
[7]
LEE NY, 1998, LECT NOTES COMPUTER, V1438, P415
[8]
Mambo M, 1996, IEICE T FUND ELECTR, VE79A, P1338
[9]
Mambo M., 1996, 3rd ACM Conference on Computer and Communications Security, P48, DOI 10.1145/238168.238185
[10]
Neuman B. C., 1993, Proceedings the 13th International Conference on Distributed Computing Systems (Cat. No.93CH3282-1), P283, DOI 10.1109/ICDCS.1993.287698