| 期刊論文1. | 丘昌泰(20040800)。從各國電子投票經驗看我國選務的改革方向。研考雙月刊,28(4)=242,25-35。 延伸查詢 | 2. | 許建隆、吳宗成(1999)。簽章加密法及其應用。資訊安全通訊,6(1),33-41。 延伸查詢 | 3. | 覃海生、張雷、馮燕強、吳文俊、何傳波(2013)。無對運算的隨機代理盲簽章方案設計。計算機工程,39(4),169-173。 延伸查詢 | 4. | 蘇品長、楊倫青、王博彥(20140800)。植基於橢圓曲線之多重盲簽密機制--具一次投領多重選票之設計。資訊管理研究. 南華大學,14,73-93。 延伸查詢 | 5. | Alghazzawi, D. M.、Salim, T. M.、Hasan, S. H.(2011)。A new proxy blind signature scheme based on ECDLP。International Journal of Computer Science Issues,8(3),73-79。 | 6. | Fan, K.、Wang, Y.、Li, H.(2012)。A new proxy blind signature scheme。International Journal of Grid and Utility Computing,3(1),38-42。 | 7. | Lal, S.、Awasthi, A.(2003)。Proxy blind signature scheme。Journal of Information Science and Engineering。 | 8. | Lu, R.、Cao, Z.、Zhou, C.(2005)。Proxy blind multi-signature scheme without a secure channel。Applied Mathematics and Computation,164(1),179-187。 | 9. | Mateu, V.、Sebe, F.、Valls, M.(2014)。Constructing credential-based E-voting systems from offline E-coin protocols。Journal of Network and Computer Applications,42,39-44。 | 10. | Pradhan, S.、Mohapatra, R. K.(2011)。Proxy blind signature scheme based on ECDLP。International Journal of Engineering Science & Technology,3(3),2244-2248。 | 11. | Qin, H. S.、Zhang, L.、Feng, Y.、Wu, W.、He, C.(2013)。Design of randomized proxy blind signcryption scheme without pairing computing。Computer Engineering,39(4),169-173。 | 12. | Sun, H.、Hsieh, B.、Tseng, S.(2005)。On the security of some proxy blind signature schemes。The Journal of Systems and Software,74(3),297-302。 | 13. | Tan, Z.、Liu, Z.、Tang, C.(2002)。Digital proxy blind signature schemes based on DLP and ECDLP。MM Research Preprints,21,212-217。 | 14. | Tian, Y.、Chen, H.、Yan, G.、Tian, J.、Wen, X.(2013)。A proxy blind signature scheme based on quantum entanglement。Optical and Quantum Electronics,45(12),1297-1305。 | 15. | Wang, C.、Liao, M.(2014)。Security Analysis and Enhanced Construction on ECDLPBased Proxy Blind Signature Scheme。International Journal of e-Education, e-Business, e-Management and e-Learning,4(1),47-51。 | 16. | Wang, H.、Wang, R.(2005)。A proxy blind signature scheme based on ECDLP。Chinese Journal of Electronics,14(2),281-284。 | 17. | Wang, R. C.、Juang, W. S.、Lei, C. L.(2008)。A Web Metering Scheme for Fair Advertisement Transactions。International Journal of Security and its Applications,2(4),49-56。 | 會議論文1. | Delaune, S.、Kremer, S.、Ryan, M.(2006)。Coercion-resistance and receipt-freeness in electronic voting。2006 IEEE 19th Computer Security Foundations Workshop。Los Alamitos, California。 | 2. | Hu, L.、Zheng, K.、Hu, Z.、Yang, Y.(2009)。A secure proxy blind signature scheme based on ECDLP。International Conference on Multimedia Information Networking and Security。 | 3. | Lin, W.、Jan, J.(2000)。A security personal learning tools using a proxy blind signature scheme。Illinois。 | 4. | Mambo, M.、Usuda, K.、Okamoto, E.(1996)。Proxy signatures for delegating sign operation。3rd ACM conference on computer and communications security。New York, NY。 | 5. | Yang, X.、Yu, Z.(2008)。Security analysis of a proxy blind signature scheme based on ECDLP。4th International Conference on Wireless Communications, Networking and Mobile Computing。Dalian。 | 6. | Zhang, F.、Kim, K.(2003)。Efficient ID-based blind signature and proxy signature from bilinear pairings。ACISP。Wollongong。 | 7. | Zheng, Y.(1997)。Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption)。17th Annual International Cryptology Conference。Springer。165-179。 | 圖書1. | 曾貴華(2010)。量子保密通信。高等教育出版社。 延伸查詢 | 圖書論文1. | Chaum, D.(1982)。Blind signatures for untraceable payments。Advances in Cryptology。New York:Springer Science Business。 | |