-
1
Design and implementation of proxy-protected proxy signature based on SM2
Published 2017-09-01Subjects: Get full text
Article -
2
-
3
Provably secure and efficient proxy signature scheme
Published 2014-08-01Subjects: Get full text
Article -
4
Delegation authorization mechanism with controllable permissions propagation for IoT devices sharing
Published 2019-04-01Subjects: Get full text
Article -
5
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Published 2015-10-01Subjects: Get full text
Article -
6
Attribute-based proxy signature scheme for unmanned aerial vehicle networks
Published 2021-11-01Subjects: Get full text
Article -
7
-
8
ID-based efficient and proactive threshold proxy signature in the standard model
Published 2011-01-01Subjects: “…proactive threshold proxy signature…”
Get full text
Article