参考文献
[1]Aladwani A M.Corruption as a Source of E-government Projects Failure in Developing Countries:A Theoretical Exposition[J].International Journal of Information Management,2016,36(1):105-112.
[2]Fan Jing,Yang Wenting.Study on E-government Services Quality:The Integration of Online and Offline Services[J].Journal of Industrial Engineering and Management,2015,8(3):693-718.
[3]李怀明,王慧佳,符林.基于组织的Web服务访问控制模型[J].计算机工程,2014,40(11):65-70.
[4]Blaze M,Bleumer G,Strauss M.Divertible Protocols and Atomic Proxy Cryptography[C]//Proceedings of EUROCRYPT’98.Berlin,Germany:Springer-Verlag,1998:127-144.
[5]Ateniese G,Hohenberger S.Proxy Re-signatures:New Definitions,Algorithms,and Applications[C]//Proceed-ings of the 12th ACM CCS.New York,USA:ACM Press,2005:310-319.
[6]Shao Jun,Cao Zhenfu,Wang Licheng,et al.Proxy Re-signature Schemes Without Random Oracles[C]//Proceedings of INDO-CRYPT’07.Berlin,Germany:Springer-Verlag,2007:197-209.
[7]Kim K,Ikkwon Y,Secogan L.Remark on Shao et al’s Bidirectional Proxy Re-signature Scheme in Indocrypt’07[J].International Journal of Network Security,2009,8(3):308-311.
[8]Libert B,Vergnaud D.Multi-use Unidirectional Proxy Re-signatures[C]//Proceedings of the 15th ACM CCS.New York,USA:ACM Press,2008:511-520.
[9]杨小东,李春梅,周思安,等.一种强不可伪造代理重签名方案[J].计算机工程,2014,40(11):130-134.
[10]Yang Xiaodong,Li Chunmei,Li Yan,et al.Divisible On-line/off-line Proxy Re-signature[J].Applied Math-ematics & Information Sciences,2015,9(2):759-767.
[11]Yang Xiaodong,Wang Caifeng,Zhang Lei,et al.On-line/off-line Threshold Proxy Re-signatures[J].Chinese Journal of Electronics,2014,23(2):248-253.
[12]Tian Miaomiao.Identity-based Proxy Re-signatures from Lattices[J].Information Processing Letters,2015,115(4):462-467.
[13]Chen Liang,Chen Xingyuan,Sun Yi,et al.A New Certificate Proxy Re-signature Scheme in the Standard Model[C]//Proceedings of ISCID’14.Washington D.C.,USA:IEEE Press,2014:202-206.
[14]孙奕,陈性元,杜学绘,等.一种用于流交换的代理重签名方案[J].软件学报,2015,26(1):129-144.
[15]Chen Xiaofeng,Zhang Fangguo,Tian Haibo,et al.Efficient Generic On-line/off-line Threshold Signatures Without Key Exposure[J].Information Sciences,2008,178(21):4192-4203.
编辑刘冰 |