共 50 条
- [21] An Identity-Based Secure and Optimal Authentication Scheme for the Cloud Computing Environment CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 69 (01): : 1057 - 1072
- [22] A Self-Organized Key Management Scheme for Ad Hoc Networks Based on Identity-Based Cryptography 2014 10TH INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM), 2014,
- [23] Security Analysis and Improvement of Identity-based Key Management Scheme for Airborne Ad Hoc Networks 2020 IEEE CONFERENCE ON TELECOMMUNICATIONS, OPTICS AND COMPUTER SCIENCE (TOCS), 2020, : 209 - 213
- [24] Polynomial Construction and Non-tree Based Efficient Secure Group Key Management Scheme SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 122 - 133
- [26] Identity and Pairing-based Secure Key Management Scheme for Heterogeneous Sensor Networks 2008 4TH IEEE INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2008, : 423 - 428
- [27] Lattice-based strongly-unforgeable forward-secure identity-based signature scheme with flexible key update KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (05): : 2792 - 2810
- [29] Design of secure key management and user authentication scheme for fog computing services FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 91 (475-492): : 475 - 492