共 50 条
- [21] Circular and KDM Security for Identity-Based Encryption PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 334 - 352
- [22] An identity-based grid security infrastructure model INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2005, 3439 : 314 - 325
- [23] An Identity-Based Security Infrastructure for Cloud Environments 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 644 - +
- [24] Strong Forward Security in Identity-Based Signcryption JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2013, 16 (4-5): : 235 - 258
- [25] Security of an identity-based cryptosystem and the related reductions ADVANCES IN CRYPTOLOGY - EUROCRYPT '98, 1998, 1403 : 546 - 560
- [26] ZigBee security using identity-based cryptography AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 3 - +
- [27] On the Security of an Identity-Based Aggregate Signature Scheme 2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1523 - +
- [28] Security Analysis of An Identity-Based Mix Net 2013 10TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2013,
- [29] An identity-based model for grid security infrastructure ADVANCED DISTRIBUTED SYSTEMS, 2005, 3563 : 258 - 266
- [30] Risk and avoidance strategy for blocking mechanism of SDN-based security service 2019 21ST INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT): ICT FOR 4TH INDUSTRIAL REVOLUTION, 2019, : 187 - 190