scientific article; zbMATH DE number 1808281
From MaRDI portal
Publication:3149767
zbMATH Open0994.68562MaRDI QIDQ3149767FDOQ3149767
Authors: Byoungcheon Lee, Heesun Kim, Kwangjo Kim
Publication date: 26 September 2002
Full work available at URL: http://link.springer.de/link/service/series/0558/bibs/2119/21190474
Title of this publication is not available (Why is that?)
Recommendations
Computing methodologies and applications (68U99) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Cited In (22)
- Directed proxy signature in the standard model
- Designated verifier proxy signature scheme without random oracles
- Title not available (Why is that?)
- Designing efficient proxy signature schemes for mobile communication
- Title not available (Why is that?)
- Identity-based undetachable digital signature for mobile agents in electronic commerce
- Reputation management and signature delegation: A distributed approach
- Security pitfalls of an efficient threshold proxy signature scheme for mobile agents
- Proxy signature with revocation
- Title not available (Why is that?)
- You can sign but not decrypt: hierarchical integrated encryption and signature
- A new proxy signature scheme with revocation
- Factoring based proxy signature schemes
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Undetachable Threshold Signatures
- Provably secure proxy signature scheme from factorization
- Policy-based authentication for mobile agents
- Title not available (Why is that?)
- A novel efficient \((t,n)\) threshold proxy signature scheme
- An efficient self-certified multi-proxy signature scheme based on elliptic curve discrete logarithm problem
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3149767)