共 50 条
- [12] Efficient ID-based deniable authentication protocols WMSCI 2006: 10TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS, 2006, : 321 - 324
- [13] Improvement of an ID-based deniable authentication protocol Lin, Tzu-Chun (lintc@fcu.edu.tw), 2018, Univ. of Electronic Science and Technology of China (16): : 139 - 144
- [15] An enhanced ID-based deniable authentication protocol on pairings COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2007, PT 2, PROCEEDINGS, 2007, 4706 : 1008 - 1017
- [17] Practical Constant-Size Ring Signature Journal of Computer Science and Technology, 2018, 33 : 533 - 541
- [18] Identity-based ring signature scheme with constant-size signature Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2007, 29 (11): : 2645 - 2648
- [19] An efficient ID-based deniable authentication protocol from pairings 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS: AINA 2005, 2005, : 388 - 391
- [20] ID-based non-interactive deniable authentication protocol FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 479 - 482