[1] |
GE Lixia1, LI Xiao1, HE Mingxing2, LI Yarong1, LIU Xiaojian2.
Improved certificateless proxy signature scheme
[J]. Computer Engineering and Applications, 2017, 53(8): 92-94.
|
[2] |
LI Yarong1, LI Xiao1, HE Mingxing2, LIU Xiaojian2, GE Lixia1.
Security analysis and improvement of forward secure proxy signature scheme
[J]. Computer Engineering and Applications, 2016, 52(14): 110-114.
|
[3] |
LIU Xiaohong, ZHANG Jianzhong.
Analysis and improvement of certificateless proxy signature scheme
[J]. Computer Engineering and Applications, 2014, 50(22): 115-117.
|
[4] |
GE Rongliang, GAO Dezhi, LIANG Jingling, ZHANG Yun.
Security analysis and improvement of certificateless signature scheme
[J]. Computer Engineering and Applications, 2013, 49(5): 96-98.
|
[5] |
CAO Tianqing, ZHANG Jianzhong.
New certificateless threshold proxy signature scheme
[J]. Computer Engineering and Applications, 2012, 48(9): 57-59.
|
[6] |
WANG Lisha, ZHANG Jianzhong.
Efficient and secure certificateless signature scheme
[J]. Computer Engineering and Applications, 2012, 48(15): 70-73.
|
[7] |
LI Bingfang1,2,RU Xiujuan3,ZHANG Shanshan4.
Cryptanalysis of two certificateless signature schemes
[J]. Computer Engineering and Applications, 2011, 47(5): 98-100.
|
[8] |
LUO Dawen,HE Mingxing,LI Xiao.
ID-based threshold ring signcryption scheme
[J]. Computer Engineering and Applications, 2011, 47(33): 65-67.
|
[9] |
HU Guozheng1,HAN Lansheng2,XIA Xiangsheng3.
Security analysis of efficient certificateless signature scheme
[J]. Computer Engineering and Applications, 2011, 47(2): 19-20.
|
[10] |
DU Hongzhen.
Cryptanalysis and improvement of two certificateless signature schemes
[J]. Computer Engineering and Applications, 2011, 47(16): 69-70.
|
[11] |
ZHANG Yanyan1,WANG Liangliang2.
New DLP-based certificateless signature scheme
[J]. Computer Engineering and Applications, 2011, 47(12): 62-64.
|
[12] |
HU Guozheng1,HAN Lansheng2,XIA Xiangsheng3.
Security analysis of certificateless signature scheme in standard model
[J]. Computer Engineering and Applications, 2011, 47(11): 11-14.
|
[13] |
ZHANG Yu-lei1,WANG Cai-fen1,ZHANG Yong-jie1,2,CHENG Wen-hua1,HAN Ya-ning1.
New efficient certificateless signature scheme
[J]. Computer Engineering and Applications, 2010, 46(14): 84-87.
|
[14] |
CHENG Wen-hua,WANG Cai-fen,QIAO Xiao-ni,HAN Ya-ning,ZHANG Yu-lei.
ID-based ring signcryption scheme without trusted party
[J]. Computer Engineering and Applications, 2009, 45(27): 119-122.
|
[15] |
HAN Ya-ning,WANG Cai-fen,ZHANG Yu-lei,CHENG Wen-hua.
Certificateless designated multi-verifiers proxy signature scheme
[J]. Computer Engineering and Applications, 2009, 45(26): 78-80.
|