共 50 条
- [41] The efficient proxy-protected proxy-signcryption scheme based on the ECKCDSA for mobile environment [J]. 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL X, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS II, 2002, : 26 - 30
- [43] Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing [J]. Journal of Shanghai Jiaotong University (Science), 1600, Shanghai Jiaotong University (19): : 398 - 405
- [47] Fog-assisted secure healthcare data aggregation scheme in IoT-enabled WSN [J]. Peer-to-Peer Networking and Applications, 2020, 13 : 163 - 174
- [48] Proxy based Resource Management Scheme in IoT Environment [J]. 2015 10TH INTERNATIONAL CONFERENCE ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (BWCCA 2015), 2015, : 544 - 546
- [49] Secret Sharing-Based IoT Text Data Outsourcing: A Secure and Efficient Scheme [J]. IEEE ACCESS, 2021, 9 : 76908 - 76920