共 50 条
- [21] Tuning the Winternitz hash-based digital signature scheme 2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 542 - 547
- [22] Hash-based counter scheme for digital rights management 2005 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), VOLS 1 AND 2, 2005, : 121 - 124
- [23] A Server-Assisted Hash-Based Signature Scheme SECURE IT SYSTEMS, NORDSEC 2017, 2017, 10674 : 3 - 17
- [26] A Secure and Scalable Identification for Hash-based RFID Systems Using Updatable Pre-computation WISEC 10: PROCEEDINGS ON THE THIRD ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2010, : 65 - 74
- [27] A Dynamic Approach to Hash-Based Privacy-Preserving RFID Protocols Smart Innovation, Systems and Technologies, 2013, 21 : 15 - 23
- [28] Quantum-Access Security of Hash-Based Signature Schemes INFORMATION SECURITY AND PRIVACY, ACISP 2023, 2023, 13915 : 343 - 380
- [29] A new hash-based authentication protocol for RFID using varying identifiers SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 2112 - 2116
- [30] A One-way Hash based Low-cost Authentication Protocol with Forward Security in RFID System 2010 2ND INTERNATIONAL ASIA CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 2, 2010, : 269 - 272