The following pages link to (Q4373633):
Displaying 43 items.
- Secure proxy signature schemes for delegation of signing rights (Q421030) (← links)
- Efficient certificateless proxy signature scheme with provable security (Q454968) (← links)
- Provably secure proxy convertible authenticated encryption scheme based on RSA (Q506763) (← links)
- A universal composability framework for analysis of proxy threshold signature (Q615210) (← links)
- Efficient proxy signcryption scheme with provable CCA and CMA security (Q623106) (← links)
- A traceable proxy multisignature scheme based on the elliptic curve cryptosystem (Q702590) (← links)
- Reputation management and signature delegation: A distributed approach (Q862580) (← links)
- Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification (Q867637) (← links)
- Designated verifier proxy signature scheme without random oracles (Q971640) (← links)
- Self-certified multi-proxy signature schemes with message recovery (Q1045611) (← links)
- New multi-proxy multi-signature schemes (Q1412584) (← links)
- Nonrepudiable proxy multi-signature scheme (Q1415953) (← links)
- Certificateless proxy signature from RSA (Q1718225) (← links)
- A new quantum proxy signature model based on a series of genuine entangled states (Q1741016) (← links)
- A new proxy signature scheme with revocation (Q1764733) (← links)
- New proxy multi-signature scheme (Q1765860) (← links)
- Provably secure proxy-protected signature schemes based on factoring (Q1774844) (← links)
- Proxy blind multi-signature scheme without a secure channel (Q1774851) (← links)
- Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability (Q1774853) (← links)
- Proxy signature schemes based on factoring (Q1853688) (← links)
- Improvement of threshold proxy signature scheme (Q1856035) (← links)
- Provably secure proxy signature scheme from factorization (Q1931037) (← links)
- Delegation with supervision (Q2384523) (← links)
- Directed proxy signature in the standard model (Q2440176) (← links)
- A novel efficient \((t,n)\) threshold proxy signature scheme (Q2489232) (← links)
- Factoring based proxy signature schemes (Q2497555) (← links)
- Cryptanalysis of and improvement on the Hwang-Chen multi-proxy multi-signature schemes (Q2570751) (← links)
- Certificateless signature and proxy signature schemes from bilinear pairings (Q2571514) (← links)
- Security of Lu et al.'s proxy-protected signature scheme (Q2571953) (← links)
- Cryptanalysis of Zhou et al.'s proxy-protected signature schemes (Q2572334) (← links)
- ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings (Q2572349) (← links)
- Improvement of efficient proxy signature schemes using self-certified public keys (Q2572675) (← links)
- Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack (Q2572681) (← links)
- Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers (Q2572722) (← links)
- Efficient proxy signature schemes using self-certified public keys (Q2577791) (← links)
- Proxy Signature with Revocation (Q2817801) (← links)
- Establishing Trust on VANET Safety Messages (Q3076974) (← links)
- Improvement of identity-based threshold proxy signature scheme with known signers (Q3443248) (← links)
- An Efficient ID-Based Proxy Signature Scheme from Pairings (Q3600319) (← links)
- Threshold-directed signature scheme based on hybrid number theoretic problems (Q4985420) (← links)
- Formal Language Identity-based Cryptography (Q5025958) (← links)
- (Q5150403) (← links)
- Proxy Signatures Secure Against Proxy Key Exposure (Q5445451) (← links)