[1] |
JIANG Ming-ming, HU Yu-pu, WANG Bao-cang, WANG Feng-he, LAI Qi-qi.
Efficient Proxy Signature over Lattices
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(3): 89-92.
|
[2] |
ZHOU Cai-xue.
Cryptanalysis and Improvement of Certificate-Based Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(6): 98-101.
|
[3] |
.
Cryptanalysis and Improvement of a Certificateless Strong Proxy Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(5): 115-118.
|
[4] |
.
Provably Secure IdentityBased Signature Scheme in the Standard Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(1): 99-102.
|
[5] |
.
Short Signcryption Scheme with Forward Security and Ciphertext Anonymity
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(4): 131-134.
|
[6] |
DU Hong-zhen1.2, WEN Qiao-yan1, LI Wen-min1, JIN Zheng-ping1.
Efficient Certificateless Strong Proxy Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(6): 18-21.
|
[7] |
XU Guo-sheng1, GU Li-ze1, YANG Yi-xian1, Zhou Xi-zeng2 .
New Designated Receiver Proxy Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(4): 42-45.
|
[8] |
ZHOU Liang1, ZHANG Wen-zhong2,YANG Yi-xian1.
Proxy Signature Scheme with Restricted Signing Capability
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(3): 103-106.
|
[9] |
CAO Xue-fei1, Kenneth.G.Paterson2, KOU Wei-dong1.
An Attack on a Certificateless Signature Scheme and Its Improvement
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(2): 64-67.
|
[10] |
WANG Ling-ling, ZHANG Guo-yin, MA Chun-guang .
A Short Linkable Ring Signature Scheme for E-Cash Protocol
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(1): 102-106.
|
[11] |
YU Yong1, YANG Bo2, LI Fa-gen1, ZHANG Ming-wu2.
An Efficient Proxy Ring Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2007, 30(3): 23-26.
|
[12] |
HU Lan-lan,YANG Yi-xian.
Mobile Agent-Based Security Scheme of Electronic Transactions
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(4): 81-85.
|
[13] |
LI Li-yuan , XU Qiu-liang.
A Threshold Proxy Signature Scheme with Actual Signers
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(4): 103-106.
|
[14] |
Xia Man-min1, GU Li-ze2.
A New Proxy Blind Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2006, 29(3): 48-52.
|
[15] |
GU Li-ze, LI Zhong-xian, YANG Yi-xian.
A Anonymous Proxy Signature Scheme without a Trusted Party
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2005, 28(1): 48-50.
|