Notes on Two Flawed Attacks on Undeniable Signature Schemes | IEEE Conference Publication | IEEE Xplore