共 50 条
- [1] Cryptanalysis of Bohio et al.'s ID-Based Broadcast Signcryption (IBBSC) Scheme for Wireless Ad-hoc Networks [J]. SIXTH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, PROCEEDINGS, 2008, : 109 - 120
- [3] Cryptanalysis of Li et al.'s Identity-Based Threshold Signcryption Scheme [J]. EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 127 - +
- [4] Cryptanalysis and Improvement of Sood et al.'s Dynamic ID-Based Authentication Scheme [J]. DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, 2012, 7154 : 141 - 152
- [5] Cryptanalysis on improved Chou et al.'s ID-based deniable authentication protocol [J]. ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 87 - +
- [7] Cryptanalysis of Tso et al.'s ID-based tripartite authenticated key agreement protocol [J]. INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2007, 4812 : 64 - +
- [8] Security Issues of Chen et al.'s Dynamic ID-based Authentication Scheme [J]. 2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 125 - +