共 50 条
- [31] ID-based ring signature and proxy ring signature schemes from bilinear pairings Int. J. Netw. Secur., 2007, 2 (187-192):
- [33] Cryptanalysis on improved Chou et al.'s ID-based deniable authentication protocol ICISS 2008: INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY, PROCEEDINGS, 2008, : 87 - +
- [34] An Optimal Authentication Protocol Using Certificateless ID-Based Signature in MANET SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 110 - 121
- [35] ID-based ring signature scheme for collaborative design system Zhongguo Kuangye Daxue Xuebao/Journal of China University of Mining and Technology, 2007, 36 (03): : 343 - 346
- [36] Highly Efficient ID-based Ring Signature from Pairings 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 829 - 834
- [37] ID-based ring signature scheme secure in the standard model ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2006, 4266 : 1 - 16
- [38] Strong designated Verifier ID-based Ring Signature Scheme ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 294 - +
- [39] An Anonymous Access Authentication Scheme for VANETs Based on ID-Based Group Signature ADVANCES ON BROADBAND AND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS, BWCCA-2018, 2019, 25 : 490 - 497