Login / Signup

The insecurity of two proxy signcryption schemes: proxy credential forgery attack and how to prevent it.

Jyh-haw Yeh
Published in: J. Supercomput. (2014)
Keyphrases