A proxy signature scheme with message recovery using self-certified public key is proposed, which withstands public key substitution attacks, active attacks, an
By utilizing artificial intelligence and pattern recognition techniques, we propose an integrated mobile-customer identity recognition approach in this paper, b