DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park, JH | ko |
dc.contributor.author | Kang, Bo Gyeong | ko |
dc.date.accessioned | 2013-03-06T12:44:09Z | - |
dc.date.available | 2013-03-06T12:44:09Z | - |
dc.date.created | 2012-02-06 | - |
dc.date.created | 2012-02-06 | - |
dc.date.issued | 2005-10 | - |
dc.identifier.citation | APPLIED MATHEMATICS AND COMPUTATION, v.169, no.2, pp.1010 - 1015 | - |
dc.identifier.issn | 0096-3003 | - |
dc.identifier.uri | http://hdl.handle.net/10203/87012 | - |
dc.description.abstract | Recently, Lu et al. presented a proxy-protected signature scheme that is based on the improved Rabin signature. We show that their scheme does not satisfy a security requirement necessary for proxy signature schemes. This results in generating proxy signatures without any permission from an original signer. | - |
dc.language | English | - |
dc.publisher | ELSEVIER SCIENCE INC | - |
dc.title | Security of Lu et al.'s proxy-protected signature scheme | - |
dc.type | Article | - |
dc.identifier.wosid | 000232811600023 | - |
dc.identifier.scopusid | 2-s2.0-25844450360 | - |
dc.type.rims | ART | - |
dc.citation.volume | 169 | - |
dc.citation.issue | 2 | - |
dc.citation.beginningpage | 1010 | - |
dc.citation.endingpage | 1015 | - |
dc.citation.publicationname | APPLIED MATHEMATICS AND COMPUTATION | - |
dc.identifier.doi | 10.1016/j.amc.2004.11.019 | - |
dc.contributor.nonIdAuthor | Park, JH | - |
dc.type.journalArticle | Article | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.