![]() |
| CrossRef Text and Data Mining |
| Result of CrossRef Text and Data Mining Search is the related articles with entitled article. If you click link1 or link2 you will be able to reach the full text site of selected articles; however, some links do not show the full text immediately at now. If you click CrossRef Text and Data Mining Download icon, you will be able to get whole list of articles from literature included in CrossRef Text and Data Mining. |
| Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes |
| Journal of Information Processing Systems. 2016;12(2):249-262. Published online 2016 June 30 DOI: https://doi.org/10.3745/JIPS.03.0050 |
|
New threshold-proxy threshold-signature schemes Attacks on Self-Certified Multi-Proxy Signature Schemes with Message Recovery Security analysis and improvement of some proxy signature schemes Insider attacks on multi-proxy multi-signature schemes ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings Attacks on threshold signature schemes with traceable signers Identity-based threshold signature and mediated proxy signature schemes Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability Analysis of Sun et al.’s linkability attack on some proxy blind signature schemes On the security of some proxy blind signature schemes |
| This metadata service is kindly provided by CrossRef from May 29, 2014. Journal of Information Processing Systems has participated in CrossRef Text and Data Mining service since February 27, 2015. |