共 50 条
- [41] Threshold Identity-Based Broadcast Encryption from Identity-Based Encryption COMPUTER APPLICATIONS FOR DATABASE, EDUCATION, AND UBIQUITOUS COMPUTING, 2012, 352 : 99 - 102
- [43] Wireless Sensor Networks Based on a New Block Encryption Algorithm Design, Manufacturing and Mechatronics, 2014, 551 : 454 - 459
- [44] ROBUST ENCRYPTION ALGORITHM BASED SHT IN WIRELESS SENSOR NETWORKS 2014 INTERNATIONAL CONFERENCE ON INFORMATION COMMUNICATION AND EMBEDDED SYSTEMS (ICICES), 2014,
- [45] Identity-Based Broadcast Encryption Schemes For Open Networks 2015 NINTH INTERNATIONAL CONFERENCE ON FRONTIER OF COMPUTER SCIENCE AND TECHNOLOGY FCST 2015, 2015, : 104 - 109
- [46] Chaos encryption algorithm for wireless sensor networks ICEMI 2005: CONFERENCE PROCEEDINGS OF THE SEVENTH INTERNATIONAL CONFERENCE ON ELECTRONIC MEASUREMENT & INSTRUMENTS, VOL 8, 2005, : 468 - 471
- [47] Identity Based Online/Offline Encryption and Signcryption Schemes Revisited SECURITY ASPECTS IN INFORMATION TECHNOLOGY, 2011, 7011 : 111 - 127
- [48] Identity-based key management scheme with provable security for wireless sensor networks Journal of Information and Computational Science, 2011, 8 (14): : 3075 - 3081
- [49] ID-MAC: An Identity-Based MAC Protocol for Wireless Sensor Networks 2013 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2013,
- [50] Secure Monitoring Scheme Based on Identity-based Threshold Signcryption for Wireless Sensor Networks 2008 4TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-31, 2008, : 3718 - 3721