Open Access
MATEC Web of Conferences
Volume 44, 2016
2016 International Conference on Electronic, Information and Computer Engineering
Article Number 02017
Number of page(s) 4
Section Electronics, Information and Engineering Application
Published online 08 March 2016
  1. M. Mambo, K. Usuda and E. Okamoto: IEICE Transactions on Fundamentals, E79-A(9), 1996, 1338–1353.
  2. S. Kim, S. Park, and D. Won: Proc.Information and Communications Security-ICIS ’97, LNCS1334, Spring-Verlag, Berlin, 1997, 223–232.
  3. K. Zhang: Proc. Information Security Workshop-ISW’97, LNCS1396, Spring-Verlag, Berlin, 1997, 191–197.
  4. Q. Xie: Applied Mathematics and Computeation, Vol.168(2),2005, 776–782. [CrossRef]
  5. Z. H. Shao: Fundamenta Informaticae, Vol.104(4), 2010, 385–392.
  6. J. Pomykala, S. Barabasz: Fundamenta Informaticae, Vol.69(4),2006, 411–425.
  7. R. B. Lu, D. K. He, C. J. Wang: Cryptanalysis of an identity-based threshold proxy signature scheme with known signers, Journal of Electronics & Information Technology, Vol.30(1), 2008, 100–103.