共 50 条
- [41] Hierarchical ID-based cryptography ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS, 2002, 2501 : 548 - 566
- [43] Constructing Certificate less Encryption and ID-Based Encryption from ID-Based Key Agreement PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010, 2010, 6487 : 167 - +
- [44] ID-based ring signature and proxy ring signature schemes from bilinear pairings Int. J. Netw. Secur., 2007, 2 (187-192):
- [45] Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2010, 6122 : 98 - +
- [48] On the Security Flaws in ID-based Password Authentication Schemes for Telecare Medical Information Systems Journal of Medical Systems, 2015, 39
- [50] Towards Efficient ID-based Signature Schemes with Batch Verifications from Bilinear Pairings 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 935 - 940