共 50 条
- [32] Comments on a Secure AKA Scheme for Multi-server Environments [J]. ADVANCES IN INTELLIGENT SYSTEMS AND COMPUTING (ECC 2021), 2022, 268 : 391 - 397
- [33] An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (07): : 2532 - 2553
- [35] Reliable cascaded delegation scheme for mobile agent environments [J]. INFORMATION SECURITY APPLICATIONS, 2003, 2908 : 55 - 68
- [36] An Efficient Provable Secure Public Auditing Scheme for Cloud Storage [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2014, 8 (11): : 4226 - 4241
- [37] Cryptanalysis of a forward secure blind signature scheme with provable security [J]. INFORMATION AND COMMUNICATIONS SECURITY, PROCEEDINGS, 2005, 3783 : 53 - 60
- [39] Authenticated Key Exchange Protocols Based on Provable Secure Attribute [J]. FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY V, 2015, : 1421 - 1425
- [40] A provable secure key management program for wireless sensor network [J]. CIS: 2007 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PROCEEDINGS, 2007, : 662 - +