共 50 条
- [31] An ID-Based Public key Cryptosystem based on the Double Discrete Logarithm Problem INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (07): : 8 - 13
- [32] New ID-based identification scheme Harbin Gongcheng Daxue Xuebao/Journal of Harbin Engineering University, 2009, 30 (01): : 86 - 90
- [33] Known Signature Attack of ID-based Multisignature Schemes FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 341 - +
- [34] Provable security of ID-based proxy signature schemes NETWORKING AND MOBILE COMPUTING, PROCEEDINGS, 2005, 3619 : 1277 - 1286
- [35] ID-Based threshold signature and mediated signature schemes SNPD 2007: EIGHTH ACIS INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING, ARTIFICIAL INTELLIGENCE, NETWORKING, AND PARALLEL/DISTRIBUTED COMPUTING, VOL 1, PROCEEDINGS, 2007, : 473 - +
- [36] Security Vulnerability of ID-Based Key Sharing Schemes IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10): : 2641 - 2643
- [37] A new hierarchical ID-based cryptosystem and CCA-secure PKE EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, 2006, 4097 : 362 - 371
- [38] ID-based secure PIM-SM schemes PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL MULTI-CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS, 2006, : 190 - +