共 50 条
- [21] Evaluation of Key Management Scheme Based on Identity 2016 IEEE 6TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (IACC), 2016, : 545 - 550
- [22] Identity - Based Multiple Key Agreement Scheme KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (12): : 2392 - 2402
- [23] A conference key distribution scheme in a totally-ordered hierarchy INFORMATION NETWORKING: NETWORKING TECHNOLOGIES FOR ENHANCED INTERNET SERVICES, 2003, 2662 : 757 - 761
- [24] Anonymous Conference Key Distribution Scheme with Perfect Forward Security MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 330 - +
- [26] A Provably Secure Identity-Based Key Agreement Protocol from Key Encapsulation Scheme PROCEEDINGS OF THE 2012 EIGHTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS 2012), 2012, : 636 - 640
- [27] IDENTITY-BASED CONFERENCE KEY BROADCAST SYSTEMS IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1994, 141 (01): : 57 - 60
- [28] Authenticated conference key distribution scheme and secure broadcast scheme with the capability to correct errors Tien Tzu Hsueh Pao/Acta Electronica Sinica, 1998, 26 (01): : 102 - 104