共 50 条
- [1] Hierarchical Identity Based Cryptography for End-to-End Security in DTNs 2008 IEEE 4TH INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTER COMMUNICATION AND PROCESSING, PROCEEDINGS, 2008, : 223 - 230
- [2] End-to-End Confidentiality for a Message Warehousing Service Using Identity-Based Encryption 2010 IEEE 26TH INTERNATIONAL CONFERENCE ON DATA ENGINEERING WORKSHOPS (ICDE 2010), 2010, : 33 - 40
- [4] Security of an identity-based cryptosystem and the related reductions ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 546 - 560
- [6] Efficient end-to-end authentication protocols for mobile networks PIMRC'96 - THE SEVENTH IEEE INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS, PROCEEDINGS, VOLS 1-3, 1996, : 1252 - 1256
- [7] A Network Assisted End-to-End Security Protocol for Mobile Applications JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2006, 1 (03): : 159 - 165
- [8] Impersonation Attacks on a Mobile Security Protocol for End-to-End Communications SECURITY AND PRIVACY IN MOBILE INFORMATION AND COMMUNICATION SYSTEMS, 2009, 17 : 278 - 287
- [9] End-to-End Security in Delay Tolerant Mobile Social Network APPLICATIONS OF COMPUTING AND COMMUNICATION TECHNOLOGIES, ICACCT 2018, 2018, 899 : 45 - 54