共 50 条
- [21] Security Vulnerability of ID-Based Key Sharing Schemes IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10): : 2641 - 2643
- [22] ID-based secure PIM-SM schemes PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL MULTI-CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS, 2006, : 190 - +
- [23] ID-based cryptographic schemes based on factoring and discrete logarithms 37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 556 - 563
- [24] On the sequentiality of three optimal structured multisignature schemes INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS, 2007, 4464 : 105 - 115
- [25] New ID-Based Blind Signature Schemes with Message Recovery 2010 INTERNATIONAL CONFERENCE ON INFORMATION, ELECTRONIC AND COMPUTER SCIENCE, VOLS 1-3, 2010, : 2020 - 2023
- [26] An ID-based proxy signature schemes without bilinear pairings annals of telecommunications - annales des télécommunications, 2011, 66 : 657 - 662
- [27] Efficient ID-Based Ring Signature and Ring Signcryption Schemes 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 866 - 870
- [29] ID-based transitive signature schemes without random oracle Tongxin Xuebao/Journal on Communications, 2010, 31 (05): : 37 - 43
- [30] Two ID-based authenticated schemes with key agreement for mobile environments JOURNAL OF SUPERCOMPUTING, 2013, 66 (02): : 973 - 988