3Mambo M, Usuda K, Okamato E. Proxy signature:Delegation of the power to sign messages. IEICE Trans. Fundamentals, 1996, E79-A(9) : 1338-1353.
4Kotzanikolaous P,Burmcster M, Chrisskopoulos V. Secure transactions with mobile agents in hostile environments. In: Proc. ACISP 2000, LNCS,2000,1841:289 - 297.
5Sander T,Tschudin C. Towards Mobile Cryptography. Technical report, International Computer Science Institute, Berkeley , 1997.
6Lee B, Kim H, Kim K . Secure mobile agent using strong non-designated proxy signature. In : Proc. of ACISP 2001, Springer-Verlag, LNCS,2001,2119:474 - 486.
7Shao ZH. Proxy signature schemes based on factoring. Information Processing Letter, 2003,85:137 - 143.
8伊丽江.代理签名及应用研究:[博士学位论文].西安:西安电子科技大学,2000.
9KIM S, PARK S, WON D. Proxy signatures. In : Proc of ICICS'97, International Conference on Information and Communications Security, Berlin :Springer- verlag, LNCS, 1997,1334 : 223 - 232.
10Sun HM, Hsieh BT. Cryptanalysis of a strong proxy signature scheme with proxy signer privacy protection . IEEE, 0-7803-7882-2/03, 2003:474 -476.