It was pulled from the database. Make sure the information is correct, I hope you are satisfied ~ ~
Liu Hongwei.
Research on Identity-based Digital Signature Algorithm
[J]。
Systems engineering and electronics.
2008.
30:
1 159- 1 162.
[2] Hu Yupu.
A New NTRU Digital Signature Scheme
[J]。
China computer journal.
2008.
3 1:
166 1- 1666.
[3] Lin and Song.
Description and Verification of Double Digital Signature Based on Petri Net
[J]。
Journal of system simulation.
2008.
20:
2498-250 1.
[4] Wang Xiaofeng.
Forward secure undeniable digital signature scheme with zero knowledge proof
[J]。
Computer engineering.
2007.
33:
27-29.
[5] Pang.
A (T, N) Threshold Digital Signature Scheme to Prevent Fraud
[J]。
Journal of electronics and information.
2007.
29:
895-897.
[6] Chen Wenbing.
Design and Analysis of Application Model Based on XML Digital Signature
[J]。
Computer engineering.
2007.
33( 1 1):
154- 156, 162.
[7] Wang Mingqiang.
A New Fuzzy Digital Signature Scheme
[J]。
Computer engineering.
2006.
32(23):
40-42.
[8] Wang Huijin
XML digital signature scheme based on zero knowledge proof
[J]。
Computer engineering.
2006.
32:
143- 145.
[9] Ju Hongwei.
Verifiable digital signature scheme based on RSA
[J]。
Computer engineering.
2006.
32:
154- 156, 165.
10] Han Yiliang.
ECDSA can publicly verify generalized signcryption.
[J]。
China computer journal.
2006.
29( 1 1):
2003-20 12.