Sciweavers

Share
INFORMATICALT   2010
Wall of Fame | Most Viewed INFORMATICALT-2010 Paper
INFORMATICALT
2010
170views more  INFORMATICALT 2010»
8 years 7 months ago
A Provably Secure Proxy Signature Scheme in Certificateless Cryptography
A proxy signature scheme enables an original signer to delegate its signing capability to a proxy signer and then the proxy signer can sign a message on behalf of the original sign...
Hu Xiong, Fagen Li, Zhiguang Qin
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source170
2Download preprint from source169
3Download preprint from source151
4Download preprint from source148
5Download preprint from source145
6Download preprint from source142
7Download preprint from source138
8Download preprint from source134
9Download preprint from source132
10Download preprint from source131
11Download preprint from source126
12Download preprint from source126
13Download preprint from source122
14Download preprint from source119
15Download preprint from source118
16Download preprint from source118
17Download preprint from source116
18Download preprint from source116
19Download preprint from source114
20Download preprint from source112
21Download preprint from source110
22Download preprint from source110
23Download preprint from source107
24Download preprint from source107
25Download preprint from source103
26Download preprint from source103
27Download preprint from source103
28Download preprint from source102
29Download preprint from source102
30Download preprint from source101
31Download preprint from source99
32Download preprint from source99
33Download preprint from source94
34Download preprint from source92
35Download preprint from source91
36Download preprint from source88
37Download preprint from source88
38Download preprint from source70
39Download preprint from source66
40Download preprint from source49
books