共 50 条
- [41] Efficient ID-based authenticated key agreement PROCEEDINGS OF THE INTERNATIONAL CONFERENCE INFORMATION COMPUTING AND AUTOMATION, VOLS 1-3, 2008, : 681 - 684
- [43] Novel Attacks and Novel Efficient Three-Party Authenticated Key Agreement Schemes for Resource-limited Devices JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (07): : 2177 - 2188
- [45] Public-key based security scheme for wireless sensor network 2008 IEEE RADIO AND WIRELESS SYMPOSIUM, VOLS 1 AND 2, 2008, : 255 - 258
- [46] Collaborative Validation of Public-Key Certificates for IoT by Distributed Caching IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2019), 2019, : 847 - 855
- [48] Two ID-based authenticated schemes with key agreement for mobile environments The Journal of Supercomputing, 2013, 66 : 973 - 988
- [49] A Public Key Encryption Scheme for String Identification 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 104 - 111
- [50] Exploration of Schemes for Authenticated Key Agreement Protocol Based on Elliptic Curve Cryptosystem 2013 SIXTH INTERNATIONAL CONFERENCE ON EMERGING TRENDS IN ENGINEERING AND TECHNOLOGY (ICETET 2013), 2013, : 134 - 135