共 50 条
- [1] Secret Key-Awareness Secure in Certificateless Cryptography [J]. 2011 3RD INTERNATIONAL CONFERENCE ON ENVIRONMENTAL SCIENCE AND INFORMATION APPLICATION TECHNOLOGY ESIAT 2011, VOL 10, PT A, 2011, 10 : 633 - 639
- [2] ECC based threshold cryptography for secure data forwarding and secure key exchange in MANET (I) [J]. NETWORKING 2005: NETWORKING TECHNOLOGIES, SERVICES, AND PROTOCOLS; PERFORMANCE OF COMPUTER AND COMMUNICATION NETWORKS; MOBILE AND WIRELESS COMMUNICATIONS SYSTEMS, 2005, 3462 : 102 - 113
- [3] Threshold Cryptography & Genetic Algorithm Based Secure Key Exchange for Mobile Hosts [J]. 2009 IEEE INTERNATIONAL ADVANCE COMPUTING CONFERENCE, VOLS 1-3, 2009, : 1297 - +
- [4] RSA Based Threshold Cryptography for Secure Routing and Key Exchange in Group Communication [J]. COMPUTER NETWORKS AND INFORMATION TECHNOLOGIES, 2011, 142 : 624 - +
- [5] Secure Random Phase Key Exchange Schemes for Image Cryptography [J]. IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (06): : 10855 - 10861
- [7] Unshared Secret Key Cryptography [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2014, 13 (12) : 6670 - 6683
- [8] Threshold cryptography based on Asmuth-Bloom secret sharing [J]. INFORMATION SCIENCES, 2007, 177 (19) : 4148 - 4160
- [9] Threshold cryptography based on asmuth-bloom secret sharing [J]. COMPUTER AND INFORMATION SCIENCES - ISCIS 2006, PROCEEDINGS, 2006, 4263 : 935 - +
- [10] Implementation of Secure Key Distribution Based On Quantum Cryptography [J]. 2009 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS 2009), 2009, : 361 - +