Security weaknesses in two proxy signature schemes

  • J. Lu

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Fingerprint

    Dive into the research topics of 'Security weaknesses in two proxy signature schemes'. Together they form a unique fingerprint.
    Sort by

    Computer Science