共 50 条
- [22] Identity based secure authentication scheme based on quantum key distribution for cloud computing Peer-to-Peer Networking and Applications, 2018, 11 : 220 - 234
- [23] A group key distribution scheme with decentralised user join SECURITY IN COMMUNICATION NETWORKS, 2003, 2576 : 146 - 163
- [24] A conference key distribution scheme using interpolating polynomials MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 963 - +
- [25] A Conference Key Distribution Scheme Using Interpolating Polynomials INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2007, 1 (02): : 9 - 20
- [26] A Scheme for Key Distribution in Wireless Sensor Network Based on Hierarchical Identity-Based Encryption 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL (ICNSC), 2015, : 539 - 543
- [27] Evaluation of Key Management Scheme Based on Identity 2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 545 - 550
- [28] Identity - Based Multiple Key Agreement Scheme KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (12): : 2392 - 2402
- [29] Modified Chen-Hwang identity-based conference key broadcast schemes with user authentication Comput Secur, 4 (339-344):