1Jin-Hui Liao. Study of College Library Appealing Information System: A Case of Longyan University[C]. International Conference of Computational Methods in Science and Engineering (ICCMSE), 04-07 April 2014, Athens, Greece, pp. 497-500. 被引量:1
2David Chuam. Blind signatures for untraceable payments[C].Advances in Cryptology Proceedings of Crypto' 82, pp. 199-203. 被引量:1
3Ron Rivest, Adi Shamir and Leonard Adleman. A method for obtaining digital signatures and public-key cryptosystems[J]. Communications of ACM, Vol. 21, No. 2, pp. 120-126, 1978. 被引量:1
4Taher E1Gamal. A Public-Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms[J]. IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472, 1985. 被引量:1
5Peter J. Smith and Michael J. J. Lennon. LUC: A new public key system[C]. Proceedings of the Ninth IFIP International Symposium on Computer Security, pp. 103- 117, 1993. 被引量:1