共 50 条
- [1] Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (03): : 932 - 934
- [4] ID-based non-interactive deniable authentication protocol FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 479 - 482
- [5] An ID-based non-interactive tripartite key agreement protocol with K-resilience PROCEEDINGS OF THE THIRD IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND COMPUTER NETWORKS, 2005, : 38 - 42
- [8] ID-based cryptographic schemes using a non-interactive public-key distribution system 14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 237 - 243
- [9] A new digital signature scheme on ID-based key-sharing infrastructures INFORMATION SECURITY, PROCEEDINGS, 1999, 1729 : 259 - 270
- [10] ID-based Non-interactive Deniable Authentication Protocol from Pairings 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 1077 - 1080