共 50 条
- [42] On the design of provably secure identity-based authentication and key exchange protocol for heterogeneous wireless access NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 972 - 981
- [43] An Improved Identity-based Authenticated Key Agreement Protocol Using Pairings 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 45 - 49
- [44] A new mutual authentication and key distribution protocol for mobile communication environments PROCEEDINGS OF THE FIFTH JOINT CONFERENCE ON INFORMATION SCIENCES, VOLS 1 AND 2, 2000, : 333 - 336
- [45] Simultaneous authentication and secrecy in identity-based data upload to cloud CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2013, 16 (04): : 845 - 859
- [46] Security of Multimedia in Cloud using Secret Shared Key 2018 INTERNATIONAL CONFERENCE ON COMPUTING, POWER AND COMMUNICATION TECHNOLOGIES (GUCON), 2018, : 908 - 912
- [47] Simultaneous authentication and secrecy in identity-based data upload to cloud Cluster Computing, 2013, 16 : 845 - 859
- [48] A Note on "A Lightweight Cloud-Assisted Identity-Based Anonymous Authentication and Key Agreement Protocol for Secure Wireless Body Area Network" IEEE SYSTEMS JOURNAL, 2024, 18 (01): : 391 - 393
- [49] An efficient identity-based secret key management scheme for MANETs Journal of China Universities of Posts and Telecommunications, 2012, 19 (SUPPL. 1): : 127 - 136
- [50] RFID mutual authentication protocol based on chaos key ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1519 - 1523