共 50 条
- [21] A Cryptocurrency Without Public-Key Cryptography SECURITY PROTOCOLS XXII, 2014, 8809 : 350 - 358
- [23] ID Authentication in PTPM and Public Key Cryptography in Cloud Environment 2018 5TH INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE 2018), 2018, : 256 - 260
- [26] An efficient key management scheme for user access control in outsourced databases World Wide Web, 2017, 20 : 467 - 490
- [27] An efficient key management scheme for user access control in outsourced databases WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2017, 20 (03): : 467 - 490
- [28] Cryptographic key assignment scheme for dynamic access control in a user hierarchy IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1999, 146 (05): : 235 - 240
- [29] Public key versus symmetric key cryptography in client–server authentication protocols International Journal of Information Security, 2022, 21 : 103 - 114
- [30] Two integrated schemes of user authentication and access control in a distributed computer network IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES, 1998, 145 (06): : 419 - 424