共 50 条
- [21] Security weaknesses of dynamic ID-based remote user authentication protocol World Academy of Science, Engineering and Technology, 2009, 35 : 190 - 193
- [22] An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 110 - 121
- [23] Security weaknesses of dynamic ID-based remote user authentication protocol World Academy of Science, Engineering and Technology, 2009, 59 : 190 - 193
- [24] Security flaws and improvement of an ID-based wireless authentication scheme with anonymity Tongxin Xuebao/Journal on Communications, 2010, 31 (9 A): : 209 - 216
- [25] Analysis and improvement of an ID-based authenticated key agreement protocol Tongxin Xuebao/Journal on Communication, 2008, 29 (12): : 16 - 21
- [26] Authentication Protocols and Authentication on the Base of PKI and ID-based 2018 WAVE ELECTRONICS AND ITS APPLICATION IN INFORMATION AND TELECOMMUNICATION SYSTEMS (WECONF), 2018,
- [28] RETRACTED: ID-based Constant-Size Deniable Ring Authentication using a Secure Accumulator (Retracted Article) ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 4, 2010, : 354 - 357
- [29] An Improvement of Dynamic ID-Based Remote User Authentication Scheme with Smart Cards 2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 4562 - 4567
- [30] ID-Based Deniable Ring Signature with Constant-Size Signature ADVANCES IN CIVIL ENGINEERING, PTS 1-6, 2011, 255-260 : 2192 - +