共 50 条
- [31] Malicious Node Detection using ID-Based Authentication Technique 2016 3RD INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN INFORMATION TECHNOLOGY (RAIT), 2016, : 398 - 403
- [32] ID-based non-interactive deniable authentication protocol FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 479 - 482
- [33] Arithmetic Correlation used in Mobile Cloud ID-based multiple authentication 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY), IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING (HPSC), AND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2016, : 105 - 108
- [34] ID-based deniable ring authentication with constant-size signature Frontiers of Computer Science in China, 2008, 2 (01): : 106 - 112
- [35] Security weaknesses of dynamic ID-based remote user authentication protocol World Academy of Science, Engineering and Technology, 2009, 35 : 190 - 193
- [36] Security flaws and improvement of an ID-based wireless authentication scheme with anonymity Tongxin Xuebao/Journal on Communications, 2010, 31 (9 A): : 209 - 216
- [37] An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 110 - 121
- [38] Security enhancement for a dynamic ID-based remote user authentication scheme International Conference on Next Generation Web Services Practices, 2005, : 437 - 440
- [39] Security weaknesses of dynamic ID-based remote user authentication protocol World Academy of Science, Engineering and Technology, 2009, 59 : 190 - 193
- [40] An Anonymous Access Authentication Scheme for VANETs Based on ID-Based Group Signature ADVANCES ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2018, 2019, 25 : 490 - 497