共 50 条
- [21] On the Linkability of Two Schnorr Type ID-based Blind Signature Schemes 2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 2, PROCEEDINGS, 2009, : 265 - 269
- [23] Efficient ID-based blind signature schemes PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE, 2007, : 260 - 264
- [24] Security on Dynamic ID-based Authentication Schemes INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 387 - 396
- [25] Security enhancement in ad hoc network with ID-based cryptosystem 7TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY, VOLS 1 AND 2, PROCEEDINGS, 2005, : 372 - 376
- [26] A practical approach of ID-based cryptosystem in ad hoc networks WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2007, 7 (07): : 909 - 917
- [28] Cryptanalysis of an ID-based proxy signature scheme with message recovery APPLIED MATHEMATICS & INFORMATION SCIENCES, 2012, 6 (03): : 419 - 422
- [30] ID-based cryptographic schemes based on factoring and discrete logarithms 37TH ANNUAL 2003 INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY, PROCEEDINGS, 2003, : 556 - 563