[1]
De Castro LN, Von Zuben FJ. Learning and Optimization Using the Clone Selection Principle. IEEE Trans on Evolutionary Computation, 2002, 6(3): 239-251.
DOI: 10.1109/tevc.2002.1011539
Google Scholar
[2]
S. Abedi and R. Tafazolli, Genetically Modified Multiuser Detection for Code Division Multiple Access Systems, IEEE Journal on Selected Areas in Communications, vol. 20, no. 2, pp.463-473, (2002).
DOI: 10.1109/49.983373
Google Scholar
[3]
Haipeng Zhang, Mitsuo Gen. Effective Genetic Approach for Optimizing Advanced Planning and Scheduling in Flexible Manufacturing System. GECCO'06, July 8-12, 2006, Seattle, Washington, USA.
Google Scholar
[4]
Z. Luo, M. Zhao, S. Liu, and Y. Liu, Generalized Parallel Interference Cancellation With Near-Optimal Detection Performance, IEEE Transactions On Signal Processing, vol. 56, no. 1, pp.304-312, January (2008).
DOI: 10.1109/tsp.2007.906774
Google Scholar
[5]
Xuanwu Zhou, Ping Wei. Proxy Authorization Signature with Conditional Anonymity and its Application[C]. Proceedings of International Symposium on Knowledge Acquisition and Modeling KAM'2008, IEEE Press. 2008, 799-803.
DOI: 10.1109/kam.2008.44
Google Scholar
[6]
ZhenJie Huang. Research on Digital Signature with Additional Properties . Xi'an: Xidian University, (2005).
Google Scholar
[7]
Xuanwu Zhou, Xiao-Yuan Yang, Ping Wei, Yupu Hu. Dynamic Group Signature with Forward Security and Its Application[C]. Proceeding of the Sixth International Conference on Grid and Cooperative Computing GCC'2007, IEEE Press. 2007, 473-480.
DOI: 10.1109/gcc.2007.63
Google Scholar
[8]
Hippe Zdzislaws, Maksy Milian Knap. Research on Pre-processing and Post-processing of Data in the Process of Creation Quasi-optimal Decision Trees. Intelligence Methods, 2002(11): 13-15.
Google Scholar
[9]
Chang Ting-Yi, Yang Chou-Chen, Hwang Min-Shiang. A threshold signature scheme for group communications without a shared distribution center. Future Generation Computer Systems, 2004, 20(6): 1013-1021.
DOI: 10.1016/j.future.2003.09.005
Google Scholar
[10]
M. Abe, M. Ohkubo and K. Suzuki. 1 out of n Signature from a Variety of Keys,. Advances in Cryptology-ASIACRYPT2002. Berlin, Heidelberg: Springer-Verlag, 2002, 415-423.
Google Scholar
[11]
Xuanwu Zhou, Ping Wei. Anonymous Proxy Authorization Signature Scheme with Forward Security [C]. Proceedings of International Conference on Computer Science and Software Engineering CSSE'2008, IEEE Press. 2008, (Vol. 3)872-875.
DOI: 10.1109/csse.2008.528
Google Scholar
[12]
Cramer R, Van Damgaard I, Maurer U. General secure multi-party computation from any linear secret-sharing scheme. Advances in Cryptology - EUROCRYPT 2000, LNCS 1807, 2000: 316-334.
DOI: 10.1007/3-540-45539-6_22
Google Scholar
[13]
Blundo C, Desantis A. Perfectly Secure Key Distribution for Dynamic Conferences. Advances in Cryptology-Crypto'92. New York: Springer-Verlag, 1993, 471-486.
DOI: 10.1007/3-540-48071-4_33
Google Scholar
[14]
Li Hui-Xian, Cheng Chun-Tian, Pang Liao-Jun. A New (t, n)-threshold Multi-secret Sharing Scheme [A]. CIS2005[C], Berlin, Heidelberg, New York: Springer-Verlag, 2005, 421-426.
Google Scholar
[15]
Camenish. J,J.M. Piveteau, Stadler.M. Efficient Group Signature Schemes for Large Groups". CRYPTO, 97, Berlin, Heidelberg: Springer-Verlag, 1997, 410~424.
Google Scholar
[16]
Xuanwu Zhou. Evolutionary Algorithm and its Application in Artificial Immune System [C]. Proceedings of International Symposium on Intelligent Information Technology Application IITA'2008, IEEE Press. 2008, 32-36.
DOI: 10.1109/iita.2008.86
Google Scholar
[17]
Jianhong Zhang, Qianhong Wu and Yumin Wang. A Novel Efficient Group Signature Scheme with Forward Security,. Information and Communications Security. 2003, Vol. 2836: 292-300.
DOI: 10.1007/978-3-540-39927-8_27
Google Scholar
[18]
Boldyreva.A. Threshold Signature, Multi Signature and Blind Signature Schemes Based on the Gap-Diffe-Hellman-Group Signature Schemes,. PKC2003, Berlin, Heidelberg: Springer-Verlag, 2003, 25(2): 31-46.
DOI: 10.1007/3-540-36288-6_3
Google Scholar
[19]
M Abe, M Ohkubo and K Suzuki. 1 out of n Signature from a Variety of Keys [A]. Advances in Cryptology-ASIACRYPT2002[C]. Berlin, Heidelberg, New York: Springer-Verlag, 2002, 415~423.
Google Scholar
[20]
T Nakanishi, M Tao and Y Sugiyama. A Group Signature Scheme Committing the Group [A], ICICS2002[C], Berlin, Heidelberg, New York: Springer-Verlag, 2002, 73~84.
DOI: 10.1007/3-540-36159-6_7
Google Scholar
[21]
Danyu Fang. Blind Digital Signature Schemes based on Design Elliptic Curves Public Key Cryptosystem [J]. Journal of ChongQing University of Posts and Telecommunications. 2006, 18(4): 1-3.
Google Scholar
[22]
Xuanwu Zhou, Xiao-Yuan Yang, Ping Wei, Yupu Hu. BSADF: Blind Signature Based on Anonymous Digital Fingerprint. Proceeding of the Fourth International Conference on Fuzzy System and Knowledge Discovery FSKD'2007, 2007. 8, IEEE Press . PP. 426-430.
DOI: 10.1109/fskd.2007.208
Google Scholar
[23]
Cabello Sergio, Padró Carles, Sáez Germán. Secret sharing Schemes with Detection of Cheaters for a General Access Structure [J]. Designs, Codes and Cryptography, 2002, 25(2): 175-188.
DOI: 10.1023/a:1013856431727
Google Scholar
[24]
Li Hui-Xian, Cheng Chun-Tian, Pang Liao-Jun. A New (t, n)-threshold Multi-secret Sharing Scheme [A]. CIS2005[C], Berlin, Heidelberg, New York: Springer-Verlag, 2005, 421-426.
Google Scholar
[25]
Guo Guo-Ping, Guo Guang-Can. Quantum secret sharing without entanglement [J]. Physics Letters A, 2003, 310(4): 247-251.
DOI: 10.1016/s0375-9601(03)00074-4
Google Scholar
[26]
D.W. Matolak, and B. Wang, Efficient Statistical Parallel Interference Cancellation for DS-CDMA in Rayleigh Fading Channels, IEEE Transactions on Wireless Communications, vol. 6, no. 2, pp.566-574, February (2007).
DOI: 10.1109/twc.2007.05264
Google Scholar
[27]
Xuanwu Zhou. Threshold Cryptosystem Based Fair Off-line E-cash[C]. Proceedings of International Symposium on Intelligent Information Technology Application IITA'2008, IEEE Press. 2008, 692-696.
DOI: 10.1109/iita.2008.87
Google Scholar
[28]
Z. Luo, M. Zhao, S. Liu, and Y. Liu, Generalized Parallel Interference Cancellation With Near-Optimal Detection Performance, IEEE Transactions On Signal Processing, vol. 56, no. 1, pp.304-312, January (2008).
DOI: 10.1109/tsp.2007.906774
Google Scholar
[29]
S. Manohar, V. Tikiya, R. Annavajjala, and A. Chockalingam, BEROptimal Linear Parallel Interference Cancellation for Multicarrier DSCDMA in Rayleigh Fading, IEEE Transactions On Communications, vol. 55, no. 6, pp.1253-1265, June (2007).
DOI: 10.1109/tcomm.2007.898860
Google Scholar
[30]
Changji Wang, Dingyi Pei, Wenbao Jiang. An Improved E-cash System based on Restricted Blind Signature[J]. Journal of Electronics, 2002, 30(7): 1083-1085.
Google Scholar
[31]
L. Chen, T. Peterson. On the Efficiency of Group Signature Providing Information-Theoretic Anonymity". EUROCRYPT, 95, Berlin, Heidelberg: Springer-Verlag, 1995, 39~49.
Google Scholar