共 50 条
- [32] A New ID-based deniable ring authentication with constant-size signature PROCEEDINGS OF THE 2009 2ND INTERNATIONAL CONFERENCE ON BIOMEDICAL ENGINEERING AND INFORMATICS, VOLS 1-4, 2009, : 1977 - +
- [34] Collusion Attacks to Tanaka's Corrected ID-Based Non-interactive Key Sharing Scheme IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (03): : 932 - 934
- [35] ID-based cryptographic schemes using a non-interactive public-key distribution system 14TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 1998, : 237 - 243
- [38] Non-interactive certificate update protocol for efficient authentication in IoT FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 113 (113): : 132 - 144
- [40] Authentication and ID-Based Key Management Protocol in Pervasive Environment Wireless Personal Communications, 2010, 55 : 91 - 103