Scheme of conference key distribution based upon user's identity

被引:0
|
作者
机构
来源
Hsi An Chiao Tung Ta Hsueh | / 8卷 / 105-108, 119期
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Sharma, Geeta
    Kalra, Sheetal
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2018, 11 (02) : 220 - 234
  • [22] Identity based secure authentication scheme based on quantum key distribution for cloud computing
    Geeta Sharma
    Sheetal Kalra
    Peer-to-Peer Networking and Applications, 2018, 11 : 220 - 234
  • [23] A group key distribution scheme with decentralised user join
    Kurnio, H
    Safavi-Naini, R
    Wang, HX
    SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 146 - 163
  • [24] A conference key distribution scheme using interpolating polynomials
    Chang, Chin-Chen
    Lin, Chu-Hsing
    Chen, Chien-Yuan
    MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 963 - +
  • [25] A Conference Key Distribution Scheme Using Interpolating Polynomials
    Chang, Chin-Chen
    Lin, Chu-Hsing
    Chen, Chien-Yuan
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2007, 1 (02): : 9 - 20
  • [26] A Scheme for Key Distribution in Wireless Sensor Network Based on Hierarchical Identity-Based Encryption
    Liu, Yan
    Wu, Xiumei
    Chen, Xuemin
    2015 IEEE 12TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2015, : 539 - 543
  • [27] Evaluation of Key Management Scheme Based on Identity
    Ramesh, Ch.
    Rao, K. Venu Gopal
    Vasumathi, D.
    2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 545 - 550
  • [28] Identity - Based Multiple Key Agreement Scheme
    Dehkordi, Massoud Hadian
    Alimoradi, Reza
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (12): : 2392 - 2402
  • [29] Modified Chen-Hwang identity-based conference key broadcast schemes with user authentication
    Natl Cheng-Kung Univ, Tainan, Taiwan
    Comput Secur, 4 (339-344):
  • [30] Modified Chen-Hwang identity-based conference key broadcast schemes with user authentication
    Wang, CH
    Hwang, T
    COMPUTERS & SECURITY, 1997, 16 (04) : 339 - 344