[[abstract]]Due to the special requirements of the mobile code system, Shieh et al. (see IEEE Trans. Veh. Technol., vol.49, p.1464-73, July 2000) proposed some multisignature schemes based on a new digital signature scheme with message recovery. One major characteristic of these schemes is to avoid using one-way hash functions and message redundancy schemes. However, this causes some security flaw. An attack is proposed to show that the underlying signature scheme is not secure. To overcome the attack, the message redundancy schemes may be still used.[[incitationindex]]SCI[[incitationindex]]E
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme i...
. In this note, we show that the signature scheme based on error-correcting codes which has been pro...
Self-certified public keys are proposed to eliminate the burden of verifying the public key before u...
AbstractIn 2007, Liu proposed an improvement of Shieh et al. multi-signature scheme in mobile code s...
[[abstract]]In 2000, Shieh et al. proposed two novel multisignature schemes (a serial multisignature...
AbstractIn 2007, Liu proposed an improvement of Shieh et al. multi-signature scheme in mobile code s...
In 1999, Yang and shieh proposed two password authentication schemes using smart cards. But in 2003,...
Tseng and his colleagues have proposed two variants of authenticated encryption scheme using self-ce...
[[abstract]]In this paper, we motivate the need for efficient multisignature schemes in delegated mo...
[[abstract]]In 1999, Ham proposed a multisignature scheme with distinguished signing authorities. In...
[[abstract]]Group signature has been proposed for many years, those schemes are still not efficient....
A serious weakness is identified in the ID-based structured multisignature scheme of Lin, Wu and Hwa...
We discuss the security of digital signature schemes based on error-correcting codes. Several attack...
Tseng et al. proposed two efficient authenticated encryption schemes with message linkages for messa...
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme i...
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme i...
. In this note, we show that the signature scheme based on error-correcting codes which has been pro...
Self-certified public keys are proposed to eliminate the burden of verifying the public key before u...
AbstractIn 2007, Liu proposed an improvement of Shieh et al. multi-signature scheme in mobile code s...
[[abstract]]In 2000, Shieh et al. proposed two novel multisignature schemes (a serial multisignature...
AbstractIn 2007, Liu proposed an improvement of Shieh et al. multi-signature scheme in mobile code s...
In 1999, Yang and shieh proposed two password authentication schemes using smart cards. But in 2003,...
Tseng and his colleagues have proposed two variants of authenticated encryption scheme using self-ce...
[[abstract]]In this paper, we motivate the need for efficient multisignature schemes in delegated mo...
[[abstract]]In 1999, Ham proposed a multisignature scheme with distinguished signing authorities. In...
[[abstract]]Group signature has been proposed for many years, those schemes are still not efficient....
A serious weakness is identified in the ID-based structured multisignature scheme of Lin, Wu and Hwa...
We discuss the security of digital signature schemes based on error-correcting codes. Several attack...
Tseng et al. proposed two efficient authenticated encryption schemes with message linkages for messa...
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme i...
In 2005, Yang, Wang, and Chang proposed an improved timestamp-based password authentication scheme i...
. In this note, we show that the signature scheme based on error-correcting codes which has been pro...
Self-certified public keys are proposed to eliminate the burden of verifying the public key before u...