共 50 条
- [31] A Public Key Encryption Scheme Based on Idempotent Semirings [J]. 41ST INTERNATIONAL CONFERENCE APPLICATIONS OF MATHEMATICS IN ENGINEERING AND ECONOMICS (AMEE'15), 2015, 1690
- [32] A Public Key Encryption Scheme Based on Compressed Sensing [J]. 2017 9TH INTERNATIONAL CONFERENCE ON ADVANCED INFOCOMM TECHNOLOGY (ICAIT 2017), 2017, : 20 - 24
- [34] Changing of the Guards: Certificate and Public Key Management on the Internet [J]. PASSIVE AND ACTIVE MEASUREMENT (PAM 2022), 2022, 13210 : 50 - 80
- [35] Robustness principles for public key protocols [J]. ADVANCES IN CRYPTOLOGY - CRYPTO '95, 1995, 963 : 236 - 247
- [37] A certificate-based signature scheme [J]. TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 99 - 111
- [38] AMI Authentication Method based on Hardware Public Key Certificate using Unique Identifier [J]. 2015 INTERNATIONAL SOC DESIGN CONFERENCE (ISOCC), 2015, : 341 - 342