Algorithms and approaches of proxy signature: A survey
dc.contributor.affiliation | Das, Manik Lal | |
dc.contributor.author | Das, Manik Lal | |
dc.contributor.author | Saxena, Ashutosh | |
dc.contributor.author | Phatak, Deepak B | |
dc.date.accessioned | 2025-08-01T13:09:05Z | |
dc.date.issued | 01-11-2009 | |
dc.format.extent | 264-284 | |
dc.identifier.citation | Das, Manik Lal; Saxena, Ashutosh and Phatak, Deepak B. "Algorithms and approaches of proxy signature: A survey," International Journal of Network Security, vol. 9, no.3, pp. 264-284, 2009. | |
dc.identifier.scopus | 2-s2.0-79951704609 | |
dc.identifier.uri | https://ir.daiict.ac.in/handle/dau.ir/1616 | |
dc.relation.ispartofseries | Vol. 9; No. 3 | |
dc.source | International Journal of Network Security | |
dc.source.uri | https://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=0cfeb68e0dd65d42568216382694ec81ee545d49 | |
dc.title | Algorithms and approaches of proxy signature: A survey |