共 37 条
[2]
Ashton K., 2009, RFID J.
[3]
Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P17, DOI 10.1007/978-3-642-19379-8_2
[4]
Boneh D, 2011, LECT NOTES COMPUT SC, V6632, P149, DOI 10.1007/978-3-642-20465-4_10
[5]
Boneh D, 2009, LECT NOTES COMPUT SC, V5443, P68
[6]
Catalano D, 2014, LECT NOTES COMPUT SC, V8616, P371, DOI 10.1007/978-3-662-44371-2_21
[7]
RKA Security of Identity-Based Homomorphic Signature Scheme
[J].
IEEE ACCESS,
2019, 7
:50858-50868
[9]
Cheng Z, 2012, INT CONF CLOUD COMPU, P1092, DOI 10.1109/CCIS.2012.6664551
[10]
De Caro A, 2011, IEEE SYMP COMP COMMU