[1]
E. Bertino, XML security. Information security technical report, Vol. 6 No. 2, (2001) pp.44-58.
DOI: 10.1016/s1363-4127(01)00206-0
Google Scholar
[2]
E. Damiani, S. De, C. Di, P. Samarati, Towards securing XML web services. ACM workshop on XML security, November 22, USA, (2002) pp.90-96.
DOI: 10.1145/764792.764806
Google Scholar
[3]
D. J. Polivy, R. Tamassia, Authenticating distributed data using Web services and XML signatures. In: proceedings of the 2002 ACM workshop on XML security, (2002) pp.80-89.
DOI: 10.1145/764792.764805
Google Scholar
[4]
K.R.P.H. Leung, L.C.K. Hui, Handling signature purposes in workflow systems. The Journal of System and Software, 55 (2001) pp.245-259.
DOI: 10.1016/s0164-1212(00)00074-1
Google Scholar
[5]
B. Liu, J. Lu, J. Yip, A Series-parallel XML Multisignature Scheme for XML Data Authentication, International Journal of Computer Science and Network Security, VOL. 9 No. 2, (2009) pp.236-247.
Google Scholar
[6]
M. Bartel, J. Boyer, B. Fox, B. LaMacchia, E. Simon, XML signature syntax and processing (second edition), Available at: http: /www. w3. org/TR/xmldsig-core/ (Accessed on 6 December 2008).
Google Scholar
[7]
T-C. Wu, C-C. Huang, D.J. Guan, Delegated multisignature scheme with document decomposition. The Journal of Systems and Software, 55 (2001) pp.321-328.
DOI: 10.1016/s0164-1212(00)00080-7
Google Scholar
[8]
E. J-L. Lu, R-F. Chen, An XML multisignature scheme. Applied Mathematics and Computation, 149 (2004) pp.1-14.
DOI: 10.1016/s0096-3003(02)00944-x
Google Scholar
[9]
K. Wolfgang, G. Sebastian, P. Michael and S. Jorg, Trustworthy Verification and Visualisation of Multiple XML-Signatures. In: proceedings of the 19th IFIP TC-11 Conference on Communications and Multimedia Security (CMS2005), LNCS 3677, (2005).
Google Scholar