Keywords: امضای پروکسی; Proxy signature; Designated verifier signature; E-healthcare; Wireless sensor networks; Message recovery signature; 94A60;
مقالات ISI امضای پروکسی (ترجمه نشده)
مقالات زیر هنوز به فارسی ترجمه نشده اند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
در صورتی که به ترجمه آماده هر یک از مقالات زیر نیاز داشته باشید، می توانید سفارش دهید تا مترجمان با تجربه این مجموعه در اسرع وقت آن را برای شما ترجمه نمایند.
Keywords: امضای پروکسی; Proxy signature; Blind signature; Bilinear pairing; Certificate-based signature; e-cash; 94A60;
Keywords: امضای پروکسی; Certificateless public key cryptography; Proxy signature; Standard model; Public key replacement attack; Malicious KGC attack; Existential unforgeability
Keywords: امضای پروکسی; Cryptography; Digital signature; Proxy signature; RSA cryptosystem; Security analysis;
Keywords: امضای پروکسی; Post-Quantum Cryptography; Multivariate Public Key Cryptography; Isomorphism of Polynomials; Proxy signature; Provable security;
Keywords: امضای پروکسی; Certificateless cryptography; Proxy signature; Proxy multi-signature; Bilinear pairing; Computational Diffie-Hellman problem;
Keywords: امضای پروکسی; Elliptic curve cryptography; Identity-based cryptosystem; Bilinear pairing; Proxy signature; Strong designated verifier; AVISPA tool
Provably secure proxy convertible authenticated encryption scheme based on RSA
Keywords: امضای پروکسی; Proxy signature; Authenticated encryption; Digital signature; Conversion
An efficient certificateless proxy signature scheme without pairing
Keywords: امضای پروکسی; Certificateless public key cryptography; Proxy signature; Bilinear pairings; Elliptic curve; Random oracle model
A novel proxy signature scheme based on user hierarchical access control policy
Keywords: امضای پروکسی; Proxy signature; Hierarchical access control; Polynomial interpolation; Security; Discrete logarithm; Hash function
A new proxy signature scheme for a specified group of verifiers
Keywords: امضای پروکسی; Data security; Digital signature; Proxy signature; Threshold proxy signature
ID-based proxy signature scheme with message recovery
Keywords: امضای پروکسی; ID-based signature; Proxy signature; Mobile agent; Bilinear pairing; Signature with message recovery
Analysis of frame attack on Hsu et al.’s non-repudiable threshold multi-proxy multi-signature scheme with shared verification
Keywords: امضای پروکسی; Proxy signature; Threshold proxy signature; Threshold multi-proxy multi-signature scheme; Non-repudiation
Provably secure proxy signature scheme from factorization
Keywords: امضای پروکسی; Cryptography; Signature; Proxy signature; Integer factorization; Provable security
A simple and robust handover authentication between HeNB and eNB in LTE networks
Keywords: امضای پروکسی; Handover authentication; Between HeNB and eNB; LTE; Proxy signature; Perfect forward/backward secrecy
Efficient certificateless proxy signature scheme with provable security
Keywords: امضای پروکسی; Proxy signature; Certificateless signature; Certificateless proxy signature; Delegation; Provable security
Improvement of a proxy multi-signature scheme without random oracles
Keywords: امضای پروکسی; Digital signature; Proxy signature; Bilinear pairing; Security proof
Strongly unforgeable proxy signature scheme secure in the standard model
Keywords: امضای پروکسی; Digital signature; Proxy signature; Strong unforgeability
A privacy problem on Hu–Huang's proxy key generation protocol
Keywords: امضای پروکسی; Proxy signature; ID-based cryptosystem; Privacy; Proxy key generation protocol; Cryptography
Cryptanalysis and improvement of a threshold proxy signature scheme
Keywords: امضای پروکسی; Proxy signature; Threshold proxy signature; Frame attack; Public-key substitute attack
Identity-based strong designated verifier signature schemes: Attacks and new construction
Keywords: امضای پروکسی; Identity base cryptography; Designated verifier signature; Identity-based signature; Proxy signature; Bilinear parirings
An efficient anonymous proxy signature scheme with provable security
Keywords: امضای پروکسی; Proxy signature; Ring signature; Bilinear pairings; Provable security
Efficient threshold proxy signature protocol for mobile agents
Keywords: امضای پروکسی; Proxy signature; Threshold proxy signature; RSA cryptosystem; Lagrange interpolation; Mobile agents
Efficient self-certified proxy CAE scheme and its variants
Keywords: امضای پروکسی; Self-certified; Proxy signature; Authenticated encryption; Convertible
Provably secure proxy-protected signature schemes based on RSA
Keywords: امضای پروکسی; Cryptography; Proxy signature; Factoring; Random oracle model
A novel nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
Keywords: امضای پروکسی; Digital signature; Proxy signature; Threshold proxy signature; Multi-proxy multi-signature; Threshold multi-proxy multi-signature scheme
Designated verifier proxy signature scheme without random oracles
Keywords: امضای پروکسی; Cryptography; Digital signature; Proxy signature; Bilinear pairings; Provable security
A novel proxy key generation protocol and its application
Keywords: امضای پروکسی; Proxy signature; Bilinear pairings; Proxy key; ID-based signature
Insider attacks on multi-proxy multi-signature schemes
Keywords: امضای پروکسی; Proxy signature; Multi-proxy; Multi-signature; Insider attack
Improvement of Yang et al.’s threshold proxy signature scheme
Keywords: امضای پروکسی; Digital signature; Proxy signature; Threshold proxy signature
Cryptanalysis and improvement of nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
Keywords: امضای پروکسی; Proxy signature; Threshold; Nonrepudiable; Shared verification
One-time proxy signatures revisited
Keywords: امضای پروکسی; One-time signature; Proxy signature; Digital signature; Delegation
Proxy-protected signature secure against the undelegated proxy signature attack
Keywords: امضای پروکسی; Digital signature; Proxy signature; Proxy-protected; Integer factorization; RSA
Hybrid proxy multisignature: A new type multi-party signature
Keywords: امضای پروکسی; Digital signature; Proxy signature; Multisignature; Hybrid proxy multisignature; Co-Diffie-Hellman problem; Random oracle model
Delegation with supervision
Keywords: امضای پروکسی; Delegation certificate; Access control; Security management; Proxy signature
Analysis of Sun et al.’s linkability attack on some proxy blind signature schemes
Keywords: امضای پروکسی; Unlinkability; Blind signature; Proxy signature; Digital signature; Cryptography
A novel efficient (t, n) threshold proxy signature scheme
Keywords: امضای پروکسی; Proxy signature; Threshold proxy signature scheme; Discrete logarithm; Lagrange interpolation
Factoring based proxy signature schemes
Keywords: امضای پروکسی; Cryptograph; Digital signature; Proxy signature; Factoring; RSA
The security of a strong proxy signature scheme with proxy signer privacy protection
Keywords: امضای پروکسی; Cryptography; Digital signature; Proxy signature; Privacy protection; Security;
Improvement of Tzeng et al.'s nonrepudiable threshold proxy signature scheme with known signers
Keywords: امضای پروکسی; Cryptography; Digital signature; Proxy signature; Threshold proxy signature; Impersonation attack;
A new proxy signature scheme with revocation
Keywords: امضای پروکسی; Proxy signature; Delegation by warrant; Revocation; Time-stamp;
Proxy blind multi-signature scheme without a secure channel
Keywords: امضای پروکسی; Proxy signature; Proxy multi-signature; Blind signature; Discrete logarithm;
Proxy signature scheme using self-certified public keys
Keywords: امضای پروکسی; Self-certified public keys; Proxy signature; DDH problem;
Designated verifier proxy signature scheme with message recovery
Keywords: امضای پروکسی; Cryptography; Proxy signature; Designated verifier; Message recovery; Elliptic curve discrete logarithm;
A robust (k, n) + 1 threshold proxy signature scheme based on factoring
Keywords: امضای پروکسی; Proxy signature; Threshold signature; Improved RSA scheme; Factoring;
Improvement on Tzeng et al.'s nonrepudiable threshold multi-proxy multi-signature scheme with shared verification
Keywords: امضای پروکسی; Proxy signature; Threshold proxy signature; Proxy multi-signature scheme; Multi-proxy multi-signature scheme; Threshold multi-proxy multi-signature scheme;
Improvement of efficient proxy signature schemes using self-certified public keys
Keywords: امضای پروکسی; Information security; Proxy signature; Self-certified public key; Cheat attack;
Efficient nonrepudiable threshold proxy signature scheme with known signers against the collusion attack
Keywords: امضای پروکسی; Digital signature; Proxy signature; Threshold proxy signature; Collusion attack;
Provably secure proxy-protected signature schemes based on factoring
Keywords: امضای پروکسی; RSA; Factoring; Proxy signature; Proxy-protected signature; Random Oracle Model;