Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes
Samaneh Mashhadi, Journal of Information Processing Systems Vol. 12, No. 2, pp. 249-262, Jun. 2016
https://doi.org/10.3745/JIPS.03.0050
Keywords: Non-Repudiation, Proxy Signature Scheme, Signature Scheme, Threshold Proxy Signature, Unforgeability
Fulltext:
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[APA Style]
Mashhadi, S. (2016). Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes. Journal of Information Processing Systems, 12(2), 249-262. DOI: 10.3745/JIPS.03.0050.
[IEEE Style]
S. Mashhadi, "Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes," Journal of Information Processing Systems, vol. 12, no. 2, pp. 249-262, 2016. DOI: 10.3745/JIPS.03.0050.
[ACM Style]
Samaneh Mashhadi. 2016. Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes. Journal of Information Processing Systems, 12, 2, (2016), 249-262. DOI: 10.3745/JIPS.03.0050.