共 50 条
- [22] A New Trapdoor in Knaspsack Public-Key Cryptosystem with Two Sequences as the Public Key THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 357 - +
- [23] A denial-of-service resistant public-key authentication and key establishment protocol CONFERENCE PROCEEDINGS OF THE 2002 IEEE INTERNATIONAL PERFORMANCE, COMPUTING, AND COMMUNICATIONS CONFERENCE, 2002, : 171 - 178
- [24] Interactive identification protocol based on a quantum public-key cryptosystem QUANTUM AND NONLINEAR OPTICS III, 2014, 9269
- [25] A public-key based authentication and key establishment protocol coupled with a client puzzle JOURNAL OF THE AMERICAN SOCIETY FOR INFORMATION SCIENCE AND TECHNOLOGY, 2003, 54 (09): : 810 - 823
- [26] Performance evaluation of public-key cryptosystem operations in WTLS protocol EIGHTH IEEE INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATION, VOLS I AND II, PROCEEDINGS, 2003, : 1245 - 1250
- [27] An improved way on Kerberos protocol based on public-key algorithms Ruan Jian Xue Bao/Journal of Software, 2001, 12 (06): : 872 - 877
- [28] An extended logic for analyzing timed-release public-key protocols INFORMATION AND COMMUNICATON SECURITY, PROCEEDINGS, 1999, 1726 : 183 - 198
- [30] New security protocol for mobile agent based on public-key infrastructure 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL XII, PROCEEDINGS: INDUSTRIAL SYSTEMS AND ENGINEERING II, 2002, : 96 - 101