Journal of Software Engineering and Applications

Vol.2 No.4(2009), Paper ID 888, 9 pages

DOI:10.4236/jsea.2009.24034

 

Secure Chained Threshold Proxy Signature without and with Supervision

 

Zoe L. JIANG, S. M. YIU, Y. DONG, L. C. K. HUI, S. H. Y. WONG

 

 

Copyright © 2009 Zoe L. JIANG, S. M. YIU, Y. DONG, L. C. K. HUI, S. H. Y. WONG et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

 

How to Cite this Article


JIANG, Z. , YIU, S. , DONG, Y. , HUI, L. and WONG, S. (2009) Secure Chained Threshold Proxy Signature without and with Supervision. Journal of Software Engineering and Applications, 2, 267-275. doi: 10.4236/jsea.2009.24034.

Copyright © 2025 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.