共 50 条
- [1] Cryptanalysis of Two Identity Based Signcryption Schemes [J]. EIGHTH IEEE INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, PROCEEDINGS, 2009, : 292 - 294
- [2] Identity-based proxy signcryption schemes [J]. INFORMATION SCIENCE AND MANAGEMENT ENGINEERING, VOLS 1-3, 2014, 46 : 1237 - 1242
- [5] Cryptanalysis of Two Ring Signcryption Schemes [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 41 - 46
- [6] Identity-Based Hybrid Signcryption [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 534 - +
- [9] Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 127 - +
- [10] Analysis and improvement of an identity-based signcryption [J]. Tongxin Xuebao/Journal on Communications, 2015, 36 (11):