共 50 条
- [41] Using chaotic maps to construct anonymous multi-receiver scheme based on BAN logic Journal of Information Hiding and Multimedia Signal Processing, 2016, 7 (04): : 685 - 696
- [42] Anonymous Multi-Receiver Public Key Encryption Based on Third Order Linear Sequences 2ND INTERNATIONAL CONFERENCE ON APPLIED MATHEMATICS, ICAM'2018, 2019, 2074
- [46] Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices Soft Computing, 2017, 21 : 6801 - 6810
- [48] Leakage-Resilient Password-Based Authenticated Key Exchange ALGORITHMS AND ARCHITECTURES FOR PARALLEL PROCESSING, ICA3PP 2017, 2017, 10393 : 285 - 296
- [49] Continuous Leakage-Resilient Public-Key Encryption Scheme with CCA Security COMPUTER JOURNAL, 2017, 60 (08): : 1161 - 1172
- [50] Efficient certificate-based public-key encryption scheme Tien Tzu Hsueh Pao, 2008, 10 (2055-2059): : 2055 - 2059