Survey of security on identity-based cryptography

被引:0
|
作者
College of Computer Science and Technology, Jilin University, Changchun 130012, China [1 ]
不详 [2 ]
机构
来源
Jisuanji Yanjiu yu Fazhan | 2009年 / 9卷 / 1537-1548期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Identity-based cryptography for grid security
    Lim, HW
    Paterson, KG
    FIRST INTERNATIONAL CONFERENCE ON E-SCIENCE AND GRID COMPUTING, PROCEEDINGS, 2005, : 395 - 404
  • [2] Identity-based cryptography for grid security
    Lim, Hoon Wei
    Paterson, Kenneth G.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (01) : 15 - 32
  • [3] Identity-based cryptography for grid security
    Hoon Wei Lim
    Kenneth G. Paterson
    International Journal of Information Security, 2011, 10 : 15 - 32
  • [4] ZigBee security using identity-based cryptography
    Nguyen, Son Thanh
    Rong, Chunming
    AUTONOMIC AND TRUSTED COMPUTING, PROCEEDINGS, 2007, 4610 : 3 - +
  • [5] A Survey of Identity-based and Attribute-based Cryptography
    QI ZhenghuaYANG GengREN XunyiCollege of ComputerNanjing University of Posts and TelecommunicationsNanjing China
    南京邮电大学学报(自然科学版), 2010, 30 (01) : 11 - 17
  • [6] RFID system security using identity-based cryptography
    Liang, Yan
    Rong, Chunming
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2008, 5061 : 482 - 489
  • [7] RFID System Security Using Identity-Based Cryptography
    Chen, Youqin
    Chen, Zhide
    Xu, Li
    2010 THIRD INTERNATIONAL SYMPOSIUM ON INTELLIGENT INFORMATION TECHNOLOGY AND SECURITY INFORMATICS (IITSI 2010), 2010, : 460 - 464
  • [8] Datagram Transport Layer Security Protocol with Identity-Based Cryptography
    School of Computer, National University of Defense Technology, Changsha
    410073, China
    Ruan Jian Xue Bao, (90-97):
  • [9] Body Sensor Network Security: An Identity-Based Cryptography Approach
    Tan, Chiu C.
    Wang, Haodong
    Zhong, Sheng
    Li, Qun
    WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 148 - 153
  • [10] An Identity-Based Elliptic Curve Cryptography for Mobile Payment Security
    Vincent O.R.
    Okediran T.M.
    Abayomi-Alli A.A.
    Adeniran O.J.
    SN Computer Science, 2020, 1 (2)