共 50 条
- [31] An Identity-Based Authentication Model for Mobile Agent FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 475 - 478
- [32] Identity-Based SIP Authentication and Key Agreement EMERGING COMPUTATION AND INFORMATION TECHNOLOGIES FOR EDUCATION, 2012, 146 : 765 - +
- [33] An Identity-Based Authentication Scheme in Cloud Computing 2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 984 - 986
- [35] Implementation and Testing of an Identity-based Authentication System 2009 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL IV, 2009, : 424 - 427
- [36] Identity-Based Authentication Scheme for the Internet of Things 2016 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATION (ISCC), 2016, : 1109 - 1111
- [37] A New Identity-based Authentication Scheme for SIP 2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 90 - 95
- [38] A Secure Identity Authentication Scheme Based on Blockchain and Identity-based Cryptography 2019 IEEE 2ND INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATION ENGINEERING TECHNOLOGY (CCET), 2019, : 90 - 95
- [39] Identity-based proof of retrievability meets with identity-based network coding CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2022, 25 (05): : 3067 - 3083
- [40] Identity-based proof of retrievability meets with identity-based network coding Cluster Computing, 2022, 25 : 3067 - 3083