1 |
M. Mambo, K. Usuda. and E. Okarnoto, 'Proxy signatures: Delegation of the power to sign messages', mICE Trans. Fundamentals, Vol.E79-4, No.9, pp. 1338-1353, Sep. 1996
|
2 |
B. Lee and K. Kim, 'Strong Proxy Signatures', mICE Trans. Fundamentals, Vol.E82, No.1. 1999
|
3 |
H. Petersen and P. Horster, 'Selfcertified keys-concepts and applications', Proc. of Communications and Multimedia Security'97. PP. 102-116, 1997
|
4 |
B. Lee. H. Kim. and K. Kim. 'Strong proxy signature and its applications'. Proc. of SCIS2001. PP. 603-608. 2001
|
5 |
이대기, 김희선, 조영섭, 진승헌, 정교일, 조현숙, '국내.외 전자서명 및 인증제도 동향 분석'. 한국정보보호학회 정보보호학회지, 제11권 제4호, pp. 27-44, 2001
|
6 |
양덕기, '사이버 증권거래와 전자서명 인증서비스 체계'. 한국정보보호학회 정보보호학회지, 제9권 제3호, pp. 28-43, 1999
|
7 |
O. Delos and J. J.Quisquater, 'An Identity-Based Signature Scheme with Bounded Life-Span', Advances in Cryptology, Proceedings of CRYPTO, 1994
|
8 |
Housley et al. 'RFC2459. Internet X.509 Publick Key Infrastructure Certificate and CRL Profile'. IETF. 1999
|
9 |
S. Kim, S. Park, and D. Won, 'Proxy signatures. revisited'. Proc. of ICICS'97. International Conference of Information and Communications Security, LNCS 1334, Springer-Verlag. pp. 223-232, 1997
|