共 50 条
- [42] Non-interactive Certificate Update Protocol for Efficient Authentication in IoT PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON THE INTERNET OF THINGS ( IOT 2019), 2019,
- [43] Cryptanalysis of a non-interactive deniable ring signature scheme International Journal of Information Security, 2021, 20 : 103 - 112
- [46] Security weaknesses of dynamic ID-based remote user authentication protocol World Academy of Science, Engineering and Technology, 2009, 35 : 190 - 193
- [47] An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 110 - 121
- [48] Security weaknesses of dynamic ID-based remote user authentication protocol World Academy of Science, Engineering and Technology, 2009, 59 : 190 - 193
- [49] Non-interactive cryptosystem for entity authentication INFORMATION SECURITY, PROCEEDINGS, 1999, 1729 : 72 - 84
- [50] Authentication Protocols and Authentication on the Base of PKI and ID-based 2018 WAVE ELECTRONICS AND ITS APPLICATION IN INFORMATION AND TELECOMMUNICATION SYSTEMS (WECONF), 2018,