共 50 条
- [21] EIBC: Enhanced Identity-Based Cryptography, a Conceptual Design 2012 IEEE INTERNATIONAL SYSTEMS CONFERENCE (SYSCON), 2012, : 179 - 185
- [22] RFID system security using identity-based cryptography UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2008, 5061 : 482 - 489
- [23] Toward hierarchical identity-based cryptography for tactical networks MILCOM 2004 - 2004 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1- 3, 2004, : 727 - 735
- [24] Securing Mobile Phone Calls with Identity-Based Cryptography ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 210 - 222
- [25] Identity-based Cryptography for Securing Mobile Phone Calls 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 365 - 370
- [26] A Secure Email Encryption Proxy Based on Identity-based Cryptography 2008 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND INFORMATION TECHNOLOGY, PROCEEDINGS, 2008, : 284 - 286
- [27] Identity-Based Cryptography on Hidden-Order Groups 2012 INTERNATIONAL WORKSHOP ON INFORMATION AND ELECTRONICS ENGINEERING, 2012, 29 : 2067 - 2071
- [28] RFID System Security Using Identity-Based Cryptography 2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 460 - 464
- [30] A secret classified label control model based on the identity-based cryptography 2019 15TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2019, : 96 - 101