Limin Sha. Analysis of an ID-based proxy signature scheme without trusted PKG and a proxy blind multi-signature scheme. In 15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2014, Las Vegas, NV, USA, June 30 - July 2, 2014. pages 1-4, IEEE, 2014. [doi]
@inproceedings{Sha14-0, title = {Analysis of an ID-based proxy signature scheme without trusted PKG and a proxy blind multi-signature scheme}, author = {Limin Sha}, year = {2014}, doi = {10.1109/SNPD.2014.6888700}, url = {http://dx.doi.org/10.1109/SNPD.2014.6888700}, researchr = {https://researchr.org/publication/Sha14-0}, cites = {0}, citedby = {0}, pages = {1-4}, booktitle = {15th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, SNPD 2014, Las Vegas, NV, USA, June 30 - July 2, 2014}, publisher = {IEEE}, }