共 50 条
- [1] Deniable authentication protocol based on elliptic curve cryptography [J]. 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 65 - 67
- [2] A secure non-interactive deniable authentication protocol based on discrete logarithms [J]. ICIC Express Letters, Part B: Applications, 2012, 3 (03): : 507 - 512
- [3] A non-interactive quantum deniable authentication protocol based on asymmetric quantum cryptography [J]. OPTIK, 2016, 127 (20): : 8693 - 8697
- [5] RETRACTED: A Non-interactive Deniable Authentication Protocol based on Elliptic Curve Discrete Logarithm Problem (Retracted Article) [J]. 2011 INTERNATIONAL CONFERENCE ON ENERGY AND ENVIRONMENTAL SCIENCE-ICEES 2011, 2011, 11 : 1018 - 1025
- [6] ID-based non-interactive deniable authentication protocol [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 479 - 482
- [7] Secure deniable authentication protocol based on ElGamal cryptography [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON INFORMATION SECURITY AND ASSURANCE, 2008, : 36 - +
- [8] Non-interactive deniable ring authentication [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2003, 2004, 2971 : 386 - 401
- [9] Secure Mutual Authentication Protocol for RFID Based on Elliptic Curve Cryptography [J]. 2016 INTERNATIONAL CONFERENCE ON PLATFORM TECHNOLOGY AND SERVICE (PLATCON), 2016,
- [10] ID-based Non-interactive Deniable Authentication Protocol from Pairings [J]. 2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 1077 - 1080