共 50 条
- [31] Cryptanalysis on an Enhanced Identity-based Deniable Authentication Protocol [J]. 2008 6TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL INFORMATICS, VOLS 1-3, 2008, : 549 - +
- [32] An Identity-Based Authentication Protocol for Clustered ZigBee Network [J]. ADVANCED INTELLIGENT COMPUTING THEORIES AND APPLICATIONS: WITH ASPECTS OF ARTIFICIAL INTELLIGENCE, 2010, 6216 : 503 - 510
- [33] Identity-based deniable authentication for ad hoc networks [J]. Computing, 2014, 96 : 843 - 853
- [34] Identity-based authentication model for multi-domain [J]. Jisuanji Xuebao, 2006, 8 (1271-1281):
- [35] An Authentication Scheme Using Identity-based Encryption & Blockchain [J]. 2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 561 - 566
- [36] Identity-based deniable authentication protocol from pairings [J]. PROCEEDINGS OF THE 10TH IASTED INTERNATIONAL CONFERENCE ON INTERNET AND MULTIMEDIA SYSTEMS AND APPLICATIONS, 2006, : 112 - +
- [37] Authentication in dynamic groups using identity-based signatures [J]. 2018 14TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB 2018), 2018,
- [38] A Secure Identity-based Deniable Authentication Protocol for MANETs [J]. PROCEEDING OF THE 2019 INTERNATIONAL CONFERENCE ON COMPUTER, INFORMATION AND TELECOMMUNICATION SYSTEMS (IEEE CITS 2019), 2019, : 91 - 95
- [39] Identity-Based Edge Computing Anonymous Authentication Protocol [J]. CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 74 (02): : 3931 - 3943
- [40] Identity-based Authentication protocol with Paring of Tate on WSN [J]. 2009 5TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-8, 2009, : 4599 - 4602