共 50 条
- [41] Identity-based cryptography in public key management [J]. PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2004, 3093 : 71 - 84
- [42] RFID privacy based on public-key cryptography [J]. Information Security and Cryptology - ICISC 2006, Proceedings, 2006, 4296 : 1 - 6
- [43] A Distributed Public Key Infrastructure Based on Threshold Cryptography for the HiiMap Next Generation Internet Architecture [J]. FUTURE INTERNET, 2011, 3 (01): : 14 - 30
- [45] Secure Session Key Sharing Using Public Key Cryptography [J]. PROCEEDING OF THE THIRD INTERNATIONAL SYMPOSIUM ON WOMEN IN COMPUTING AND INFORMATICS (WCI-2015), 2015, : 573 - 576
- [46] Hierarchical key assignment without public-key cryptography [J]. COMPUTERS & SECURITY, 2001, 20 (07) : 612 - 619
- [48] Efficient Public-Key Cryptography in the Presence of Key Leakage [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2010, 2010, 6477 : 613 - 631
- [50] Lightweight Cryptography for Internet of Insecure Things: A Survey [J]. 2019 IEEE 9TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2019, : 475 - 481