Cited By
View all- Lu DZhang BZhao HLi X(2009)A threshold proxy signature scheme from bilinear pairingsProceedings of the 5th International Conference on Wireless communications, networking and mobile computing10.5555/1738467.1738601(4664-4667)Online publication date: 24-Sep-2009
- Li FHu Y(2007)Security Analysis of the Pomykala-Barabasz SchemeFundamenta Informaticae10.5555/2367421.236742680:4(453-459)Online publication date: 1-Dec-2007
- Li FHu Y(2007)Security Analysis of the Pomykala-Barabasz SchemeFundamenta Informaticae10.5555/1366548.136655480:4(453-459)Online publication date: 1-Dec-2007
- Show More Cited By