We propose a three-step technique to achieve this purpose.First, we utilize a collection of XML namespaces organized into hierarchical structure as a medium for
This paper provides theoretical foundations for the secure proxy signature primitive. We present a formal model for the security of proxy signature schemes, whi