共 50 条
- [31] Transparent End-to-End Security for Publish/Subscribe Communication in Cyber-Physical Systems SAT-CPS'21: PROCEEDINGS OF THE 2021 ACM WORKSHOP ON SECURE AND TRUSTWORTHY CYBER-PHYSICAL SYSTEMS, 2021, : 78 - 87
- [33] Research on End-to-End Security Authentication Protocol of NB-IoT for Smart Grid Based on Physical Unclonable Function 2019 IEEE 11TH INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN 2019), 2019, : 239 - 244
- [35] Efficient Identity-Based Key Issue With TPM PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE FOR YOUNG COMPUTER SCIENTISTS, VOLS 1-5, 2008, : 2354 - 2359
- [37] Efficient Identity-Based Signcryption in the Standard Model PROVABLE SECURITY, 2011, 6980 : 120 - +
- [38] Security Proofs for Identity-Based Identification and Signature Schemes Journal of Cryptology, 2009, 22 : 1 - 61
- [39] On the Security of An Identity-based Single-sign-on Scheme ICCSIT 2010 - 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 3, 2010, : 117 - 120
- [40] Group Anonymous D2D Communication with End-to-End Security in LTE-A 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 451 - 459