Algorithms and approaches of proxy signature: A survey

dc.contributor.affiliationDas, Manik Lal
dc.contributor.authorDas, Manik Lal
dc.contributor.authorSaxena, Ashutosh
dc.contributor.authorPhatak, Deepak B
dc.date.accessioned2025-08-01T13:09:05Z
dc.date.issued01-11-2009
dc.format.extent264-284
dc.identifier.citationDas, Manik Lal; Saxena, Ashutosh and Phatak, Deepak B. "Algorithms and approaches of proxy signature: A survey," International Journal of Network Security, vol. 9, no.3, pp. 264-284, 2009.
dc.identifier.scopus2-s2.0-79951704609
dc.identifier.urihttps://ir.daiict.ac.in/handle/dau.ir/1616
dc.relation.ispartofseriesVol. 9; No. 3
dc.sourceInternational Journal of Network Security
dc.source.urihttps://citeseerx.ist.psu.edu/document?repid=rep1&type=pdf&doi=0cfeb68e0dd65d42568216382694ec81ee545d49
dc.titleAlgorithms and approaches of proxy signature: A survey

Files

Collections