Efficient mobile IP registration in certificateless public key infrastructure

被引:0
|
作者
Ma, Hua [1 ]
Liu, Xue [1 ]
Liu, Zhen-Hua [1 ,2 ]
Dong, Bo [1 ]
机构
[1] Dept. of Mathematics, Xidian Univ., Xi'an 710071, China
[2] Network and Data Security Key Lab. of Sichuan Province, Univ. of Electronic Sci. and Technol. of China, Chengdu 611731, China
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:135 / 139
相关论文
共 50 条
  • [42] A Certificateless Threshold Public Key Encryption Scheme
    ZOU Xiubin1
    2.College of Computer and Mathematics
    3.Ira A.Fulton Schools of Engineering
    WuhanUniversityJournalofNaturalSciences, 2012, 17 (03) : 223 - 228
  • [43] Certificateless public key encryption with equality test
    Qu, Haipeng
    Yan, Zhen
    Lin, Xi-Jun
    Zhang, Qi
    Sun, Lin
    INFORMATION SCIENCES, 2018, 462 : 76 - 92
  • [44] Certificateless Public Key Cryptography: A Research Survey
    Sayid, Jacob
    Sayid, Isaac
    Kar, Jayaprakash
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (07): : 103 - 117
  • [45] Efficient and Scalable Public Key Infrastructure for Wireless Sensor Networks
    Kim, Daehee
    An, Sunshin
    2014 INTERNATIONAL SYMPOSIUM ON NETWORKS, COMPUTERS AND COMMUNICATIONS, 2014,
  • [46] Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks
    Munivel, E.
    Ajit, G. M.
    2010 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR COMPUTING, 2010, : 47 - 52
  • [47] Certificateless Public Key Encryption Made Practical
    Viet Cuong Trinh
    2017 4TH NAFOSTED CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS), 2017, : 54 - 59
  • [48] Certificateless Public Key Cryptography in the Standard Model
    Canard, Sebastien
    Viet Cuong Trinh
    FUNDAMENTA INFORMATICAE, 2018, 161 (03) : 219 - 248
  • [49] Certificateless Public Key Encryption with Keyword Search
    Peng Yanguo
    Cui Jiangtao
    Peng Changgen
    Ying Zuobin
    CHINA COMMUNICATIONS, 2014, 11 (11) : 100 - 113
  • [50] PUBLIC KEY REGISTRATION
    MATYAS, SM
    LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 451 - 458