Cited By
View all- Lee CChen TLin SHwang M(2012)A New Proxy Electronic Voting Scheme Based on Proxy SignaturesFuture Information Technology, Application, and Service10.1007/978-94-007-4516-2_1(3-12)Online publication date: 5-Jun-2012
- Lu J(2006)Security weaknesses in two proxy signature schemesProceedings of the 2006 international conference on Computational Science and Its Applications - Volume Part III10.1007/11751595_50(466-475)Online publication date: 8-May-2006
- Cao TLin DXue R(2004)Improved Privacy-Protecting Proxy Signature SchemeContent Computing10.1007/978-3-540-30483-8_25(208-213)Online publication date: 2004