CrossRef Text and Data Mining
Result of CrossRef Text and Data Mining Search is the related articles with entitled article. If you click link1 or link2 you will be able to reach the full text site of selected articles; however, some links do not show the full text immediately at now. If you click CrossRef Text and Data Mining Download icon, you will be able to get whole list of articles from literature included in CrossRef Text and Data Mining.
Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes
Journal of Information Processing Systems. 2016;12(2):249-262.   Published online 2016 June 30    DOI: https://doi.org/10.3745/JIPS.03.0050

Excel Download

New threshold-proxy threshold-signature schemes
Computers & Electrical Engineering. 2005;31(1):69-80   
Link1 Link2

Attacks on Self-Certified Multi-Proxy Signature Schemes with Message Recovery
Applied Mechanics and Materials. 2011;135-136:316-320   
Link1

Security analysis and improvement of some proxy signature schemes
Proceedings of the 3rd international conference on Information security. 2004;27-32   
Link1 Link2

Insider attacks on multi-proxy multi-signature schemes
Computers & Electrical Engineering. 2007;33(2):88-93   
Link1 Link2

ID-based multi-proxy signature, proxy multi-signature and multi-proxy multi-signature schemes from bilinear pairings
Applied Mathematics and Computation. 2005;169(1):437-450   
Link1 Link2

Attacks on threshold signature schemes with traceable signers
Information Processing Letters. 1999;71(1):1-4   
Link1 Link2

Identity-based threshold signature and mediated proxy signature schemes
The Journal of China Universities of Posts and Telecommunications. 2007;14(2):69-74   
Link1 Link2

Self-certified threshold proxy signature schemes with message recovery, nonrepudiation, and traceability
Applied Mathematics and Computation. 2005;164(1):201-225   
Link1 Link2

Analysis of Sun et al.’s linkability attack on some proxy blind signature schemes
Journal of Systems and Software. 2006;79(2):176-179   
Link1 Link2

On the security of some proxy blind signature schemes
Journal of Systems and Software. 2005;74(3):297-302   
Link1 Link2

This metadata service is kindly provided by CrossRef from May 29, 2014. Journal of Information Processing Systems has participated in CrossRef Text and Data Mining service since February 27, 2015.