C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Security Analysis and Improvement of a ($t, n$) Threshold Proxy Signature Scheme.
Fanyu Kong
Jia Yu
Baodong Qin
Ming Li
Daxing Li
Published in:
SNPD (3) (2007)
Keyphrases
</>
proxy signature scheme
security analysis
forward secure
security requirements
designated verifier
smart card
public key
security model
encryption scheme
standard model
signcryption scheme
private key
security properties
proxy signature
software engineering
information security
software systems