共 44 条
[21]
Jae Choon Cha, 2002, Public Key Cryptography - PKC 2003. 6th International Workshop on Practice and Theory in Public Key Cryptography. Proceedings (Lecture Notes in Computer Science Vol.2567), P18
[22]
Blockchain-Based Signature Scheme with Cryptographic Reverse Firewalls for IoV
[J].
FRONTIERS IN CYBER SECURITY, FCS 2023,
2024, 1992
:82-95
[23]
Kang Burong, 2023, Algorithms and Architectures for Parallel Processing: 22nd International Conference, ICA3PP 2022, Proceedings. Lecture Notes in Computer Science (13777), P192, DOI 10.1007/978-3-031-22677-9_11
[26]
Asymmetric Subversion Attacks on Signature Schemes
[J].
INFORMATION SECURITY AND PRIVACY,
2018, 10946
:376-395
[28]
Concessive Online/Offline Attribute Based Encryption with Cryptographic Reverse Firewalls Secure and Efficient Fine-Grained Access Control on Corrupted Machines
[J].
COMPUTER SECURITY (ESORICS 2018), PT II,
2018, 11099
:507-526
[29]
Cryptographic Reverse Firewalls
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II,
2015, 9057
:657-686