Cryptology and Network Security: 4th International ...
Preview
Two Proxy Signcryption Schemes from Bilinear Pairings Qin Wang, Zhenfu Cao .. ....................................... 161 Constructing Secure Warrant-Based Proxy Signcryption Schemes Yuan Zhou, Zhenfu Cao, Rongxing Lu ............................ 172 ...