共 50 条
- [1] A New Path Verification Protocol for Securing BGP HPCC 2008: 10TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2008, : 425 - 431
- [2] Poster: iPKI: Identity-based Private Key Infrastructure for Securing BGP Protocol CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1632 - 1634
- [3] Improvement of an Identity-Based Aggregate Signature Protocol from Lattice DIGITAL FORENSICS AND CYBER CRIME, PT 2, ICDF2C 2023, 2024, 571 : 258 - 263
- [4] Identity-based aggregate signatures PUBLIC KEY CRYPTOGRAPHY - PKC 2006, PROCEEDINGS, 2006, 3958 : 257 - 273
- [5] A Quantum Secure and Noninteractive Identity-Based Aggregate Signature Protocol From Lattices IEEE SYSTEMS JOURNAL, 2022, 16 (03): : 4816 - 4826
- [6] AT: an origin verification mechanism based on Assignment Track for securing BGP 2008 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, PROCEEDINGS, VOLS 1-13, 2008, : 5739 - 5745
- [7] Identity-based Cryptography for Securing Mobile Phone Calls 2009 INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS: WAINA, VOLS 1 AND 2, 2009, : 365 - 370
- [8] Securing Internet of Drones With Identity-Based Proxy Signcryption IEEE ACCESS, 2021, 9 : 89133 - 89142
- [9] Securing Mobile Phone Calls with Identity-Based Cryptography ADVANCES IN INFORMATION SECURITY AND ASSURANCE, 2009, 5576 : 210 - 222
- [10] Leakage resilient identity-based aggregate signcryption Beijing Youdian Daxue Xuebao, 1600, 5 (20-25):