共 50 条
- [31] An Identity-Based Authentication Scheme in Cloud Computing 2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 984 - 986
- [32] An Identity-Based Security Infrastructure for Cloud Environments 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 644 - +
- [33] Identity-based data storage in cloud computing FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (03): : 673 - 681
- [35] An identity-based integrity verification scheme for cloud storage in 5G environment Zhang, Jianwei (mailzjw@163.com), 1600, Inderscience Publishers (64): : 168 - 177
- [37] Identity-based authenticated blind signature protocol Shanghai Jiaotong Daxue Xuebao, 2006, 7 (1170-1173):
- [38] An Identity-Based Authentication Protocol for Sensor Networks 2014 IEEE NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING (IEEE ISSNIP 2014), 2014,
- [39] An Identity-based Restricted Deniable Authentication Protocol 2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 474 - 478
- [40] An Improvement of an Identity-Based Key Issuing Protocol 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 4518 - 4521