共 50 条
- [31] Secure Monitoring Scheme Based on Identity-based Threshold Signcryption for Wireless Sensor Networks [J]. 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3718 - 3721
- [34] Identity - Based Multiple Key Agreement Scheme [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (12): : 2392 - 2402
- [35] Identity-based key agreement protocols in a multiple PKG environment [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2005, VOL 4, PROCEEDINGS, 2005, 3483 : 877 - 886
- [36] Identity-Based Authenticated Asymmetric Group Key Agreement Protocol [J]. COMPUTING AND COMBINATORICS, 2010, 6196 : 510 - 519
- [39] An identity-based group key agreement protocol from pairing [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 532 - +