Security weakness of a certificate-based proxy signature scheme for IIoT environments

Je Hong Park, Woo-Hwan Kim. Security weakness of a certificate-based proxy signature scheme for IIoT environments. Inf. Process. Lett., 183:106406, January 2024. [doi]

Abstract

Abstract is missing.