[1]
2013. Security Analysis Using Batch Verification Scheme. International Journal of Engineering and Computer Science. 2, 09 (Sep. 2013).