Cited By
View all- Fakhfakh NPourraz FVerjus HMoreaux P(2012)Client-Oriented Preferences Model for QoS Aggregation in Service-Based ApplicationsE-Business and Telecommunications10.1007/978-3-642-35755-8_11(141-155)Online publication date: 2012
Relations between various cryptographic schemes make it possible to build a new cryptographic scheme from (some components of) other kinds of cryptographic schemes. Recently, three new schemes are proposed by exploiting these relationships: a group ...
Many threshold proxy signature schemes are proposed in which the t out of n threshold schemes are deployed; but they still lack the property of security. In this research paper, secret sharing proxy signature could permit the shares of designated ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in