共 50 条
- [21] An ID-based hybrid broadcast signcryption scheme with user anonymity Lin, Z.-Q., 2013, Sichuan University (45):
- [22] Efficient ID-based TPM key loading scheme for trusted platform Journal of China Universities of Posts and Telecommunications, 2010, 17 (04): : 74 - 79
- [23] The Analysis of an Efficient and Provably Secure ID-Based Threshold Signcryption Scheme and Its Secure Version PROVABLE SECURITY, 2008, 5324 : 210 - +
- [24] Efficient ID-Based Ring Signature and Ring Signcryption Schemes 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 866 - 870
- [26] Secure delegation-by-warrant ID-based proxy signcryption scheme COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 445 - 450
- [27] Secure ID-based proxy signcryption scheme with designated proxy signcrypter MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 351 - 355
- [28] ID-based threshold proxy signcryption scheme from bilinear pairings Int. J. Secur. Netw., 2008, 3 (206-215):