[1] |
CHENG Yage, HU Mingsheng, GONG Bei, WANG Lipeng, XU Erfeng.
Dynamic Threshold Signature Scheme with Strong Forward Security
[J]. Computer Engineering and Applications, 2020, 56(5): 125-134.
|
[2] |
LIU Jiajia, LIU Jianhua.
Fuzzy attribute-based signcryption scheme with constant length ciphertext
[J]. Computer Engineering and Applications, 2017, 53(5): 128-133.
|
[3] |
TIAN Juanhong, ZHANG Jianzhong, LI Yanping.
Robust multi-proxy multi-blind signature scheme
[J]. Computer Engineering and Applications, 2017, 53(1): 130-133.
|
[4] |
ZHANG Min, DU Weizhang.
Publicly verifiable and renewable multi-secret sharing scheme with self-selecting sub-secret
[J]. Computer Engineering and Applications, 2016, 52(9): 71-77.
|
[5] |
ZHANG Jiao, HE Yong, LI Xiong.
Cryptanalysis and improvement of two verifiable ring signature schemes
[J]. Computer Engineering and Applications, 2016, 52(8): 115-119.
|
[6] |
ZHANG Zhiming, LI Ping, XIONG Xiaoyong.
Efficient false data filtering scheme for wireless sensor networks
[J]. Computer Engineering and Applications, 2015, 51(24): 78-85.
|
[7] |
ZHANG Jianzhong, YANG Li.
Cryptography analysis and improvement on certificateless proxy blind signature scheme
[J]. Computer Engineering and Applications, 2014, 50(4): 90-93.
|
[8] |
JIA Zongpu, LI He, SONG Cheng, ZHANG Xiaohong.
Efficient certificateless tripartite key agreement protocol
[J]. Computer Engineering and Applications, 2014, 50(10): 105-107.
|
[9] |
HUANG Rufen, NONG Qiang, HUANG Zhenjie.
Efficient provably secure certificate-based signature scheme
[J]. Computer Engineering and Applications, 2013, 49(24): 55-60.
|
[10] |
WANG Feng.
Novel designated verifier signature with message recovery
[J]. Computer Engineering and Applications, 2013, 49(24): 97-99.
|
[11] |
CHEN Jianneng, YUE Hao, HUANG Zhenjie.
Secure certificate-based aggregate signature scheme
[J]. Computer Engineering and Applications, 2013, 49(21): 60-64.
|
[12] |
PAN Shuai, GAO Dezhi, ZHAI Zhengyuan, LI Xiaolin.
Safe and effective verifiably encrypted signature scheme
[J]. Computer Engineering and Applications, 2013, 49(20): 96-99.
|
[13] |
ZHANG Jianzhong, XIE Junqin.
Improved threshold signature scheme for resisting conspiracy attack
[J]. Computer Engineering and Applications, 2013, 49(18): 52-55.
|
[14] |
DENG Yuqiao.
Dynamic attribute-based signature scheme
[J]. Computer Engineering and Applications, 2013, 49(15): 19-22.
|
[15] |
XU Taiping, CHEN Yong.
Threshold hybrid proxy multi-signature scheme against conspiracy attack
[J]. Computer Engineering and Applications, 2013, 49(14): 73-76.
|