共 50 条
- [33] What Can Identity-Based Cryptography Offer to Web Services? SWS'07: PROCEEDINGS OF THE 2007 ACM WORKSHOP ON SECURE WEB SERVICES, 2007, : 26 - 36
- [35] Biometric Identity-Based Cryptography for e-Government Environment 2014 SCIENCE AND INFORMATION CONFERENCE (SAI), 2014, : 581 - 588
- [36] Datagram Transport Layer Security Protocol with Identity-Based Cryptography Ruan Jian Xue Bao, (90-97):
- [37] SIMULATION OF AN IDENTITY-BASED CRYPTOGRAPHY SCHEME FOR AD HOC NETWORKS SECRYPT 2009: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2009, : 135 - 139
- [38] Body Sensor Network Security: An Identity-Based Cryptography Approach WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 148 - 153
- [40] Distributed Private-Key Generators for Identity-Based Cryptography SECURITY AND CRYPTOGRAPHY FOR NETWORKS, 2010, 6280 : 436 - 453