共 50 条
- [21] Re: What's Up Johnny? Covert Content Attacks on Email End-to-End Encryption APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 24 - 42
- [23] A Pairing Free Anonymous Certificateless Group Key Agreement Protocol for Dynamic Group Wireless Personal Communications, 2015, 82 : 1027 - 1045
- [24] A Certificateless Authenticated Group Key Agreement Protocol providing Forward Secrecy INTERNATIONAL SYMPOSIUM ON UBIQUITOUS MULTIMEDIA COMPUTING, PROCEEDINGS, 2008, : 124 - +
- [25] A Pairing-free Certificateless Authenticated Group key Agreement Protocol 2014 IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2014 IEEE 6TH INTL SYMP ON CYBERSPACE SAFETY AND SECURITY, 2014 IEEE 11TH INTL CONF ON EMBEDDED SOFTWARE AND SYST (HPCC,CSS,ICESS), 2014, : 510 - 513
- [26] Secret Key Recovery in a Global-Scale End-to-End Encryption System PROCEEDINGS OF THE 18TH USENIX SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION, OSDI 2024, 2024, : 703 - 719
- [27] JEDI: Many-to-Many End-to-End Encryption and Key Delegation for IoT PROCEEDINGS OF THE 28TH USENIX SECURITY SYMPOSIUM, 2019, : 1519 - 1536
- [28] Session Key Agreement for End-to-End Security in Time-Synchronized Networks 2018 TENTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2018), 2018, : 493 - 496
- [29] End-to-End Authenticated Key Exchange Agreement for Wearable Devices in IoT Environments 2017 IEEE GREAT LAKES BIOMEDICAL CONFERENCE (GLBC), 2017,