Voir la notice de l'article provenant de la source Math-Net.Ru
@article{PDM_2010_4_a1, author = {P. A. Pautov}, title = {Authentication in multi-tier systems using proxy signatures}, journal = {Prikladna\^a diskretna\^a matematika}, pages = {18--22}, publisher = {mathdoc}, number = {4}, year = {2010}, language = {ru}, url = {http://geodesic.mathdoc.fr/item/PDM_2010_4_a1/} }
P. A. Pautov. Authentication in multi-tier systems using proxy signatures. Prikladnaâ diskretnaâ matematika, no. 4 (2010), pp. 18-22. http://geodesic.mathdoc.fr/item/PDM_2010_4_a1/
[1] Pautov P. A., “Autentifikatsiya v modeli doverennoi podsistemy na osnove kommutativnogo shifrovaniya”, Prikladnaya diskretnaya matematika, 2010, no. 3, 90–95
[2] Mambo M. M., Usuda K., Okamoto E., “Proxy Signatures: Delegation of the Power to Sign Message”, IEICE Transaction Fundamentals, E79-A:9 (1996), 1338–1353
[3] Boldyreva A., Palacio A., Warinschi B., Secure Proxy Signature Schemes for Delegation of Signing Rights, , 2003 http://eprint.iacr.org/2003/096.pdf
[4] Tan Z., Liu Z., “Provably Secure Delegation-by-Certification Proxy Signature Schemes”, InfoSecu' 04, Proceedings of the 3rd International Conference on Information security, 2004, 38–43