Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes
Samaneh Mashhadi, Journal of Information Processing Systems Vol. 12, No. 2, pp. 249-262, Jun. 2016
Keywords: Non-Repudiation, Proxy Signature Scheme, Signature Scheme, Threshold Proxy Signature, Unforgeability
Fulltext:
Abstract
Statistics
Show / Hide Statistics
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
|
Cite this article
[APA Style]
Mashhadi, S. (2016). Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes. Journal of Information Processing Systems, 12(2), 249-262. DOI: 10.3745/JIPS.03.0050.
[IEEE Style]
S. Mashhadi, "Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes," Journal of Information Processing Systems, vol. 12, no. 2, pp. 249-262, 2016. DOI: 10.3745/JIPS.03.0050.
[ACM Style]
Samaneh Mashhadi. 2016. Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes. Journal of Information Processing Systems, 12, 2, (2016), 249-262. DOI: 10.3745/JIPS.03.0050.