3Rajarajan Sampath, Deepak Goel. RATING: Rigorous Assessment of Trust in Identity Management[C]//Proceedings of the First International Conference on Availability, Reliability and Security. IEEE COMPUTER SOCIETY, 2006 : 10 -19. 被引量:1
4Altmann, J. Sampath, R. UNIQUE: A User-Centric Framework for Network Identity Management [C]//Network Operations and Management Symposium. 10th IEEE/IFIP, 10.1109/NOMS. 2006:495 -506. 被引量:1
5Daeseon Choi,Seung-Hun Jin and Hyunsoo Yoon. Trust Management for User-Centric Identity Management on the Internet[C]// ISCE 2007, IEEE International Symposium. Consumer Electronics, 2007:1-4. 被引量:1
6M. Burmester, Y. Desmedt, Hiroshi Doi, et al. A Structured E1Gamal-Type Multisignature Scheme[J]. PKC2000, 2000,LNCS1751: 466-483. 被引量:1
7Mitsuru Tada. An Order-Specified Multisignature Scheme Secure Against Active Insider Attacks[C]//L. Batten, J. Seberry. ACISP2002. Melbourne: Springer Berlin/Heidelberg 2002: 57-106. 被引量:1
8Gangishetti R, choudary Gorantla M, Lal Das M, et al. Identity Based Multisignatures[J]. lOS press, 2006, 17(2) : 177-186. 被引量:1
9Bart De Decker, Frank Piessens, Jan Smith, et al. Advances in Network and Distributed Systems Security[M]. Boston :Springer, 2002. 被引量:1
10C. C. Chang, E.-H. Lu, S.-F. Pon, andJ.-Y. Lee, Applying Harn- Kiesler multisignature scheme to electronic document systems [C]//Proc. National Information Security Conf.., R.O.C., 1995: 35-38. 被引量:1