共 14 条
[1]
[Anonymous], 2007, INT J NETWORK SECURI
[2]
Aumann Y., 1998, INT C THEOR COMP SCI
[3]
BONEH D, 2001, LNCS, V2139
[4]
CAO T, 2006, INT J NETWORK SECURI, V3, P112
[5]
Cao TJ, 2005, 19TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 1, PROCEEDINGS, P388
[6]
Cheng X., 2006, INT J NETWORK SECURI, V2, P29
[7]
Deniable authentication protocols
[J].
IEE PROCEEDINGS-COMPUTERS AND DIGITAL TECHNIQUES,
2001, 148 (02)
:101-104
[8]
Dwork C., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P409, DOI 10.1145/276698.276853
[10]
Efficient identity based signature schemes based on pairings
[J].
SELECTED AREAS IN CRYPTOGRAPHY,
2003, 2595
:310-324