共 50 条
- [41] MADTLS: Fine-grained Middlebox-aware End-to-end Security for Industrial Communication PROCEEDINGS OF THE 19TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, ACM ASIACCS 2024, 2024, : 972 - 986
- [42] Security analysis of batch verification on identity-based signature schemes PROCEEDING OF THE 11TH WSEAS INTERNATIONAL CONFERENCE ON COMPUTERS: COMPUTER SCIENCE AND TECHNOLOGY, VOL 4, 2007, : 50 - +
- [43] Efficient identity-based key encapsulation to multiple parties CRYPTOGRAPHY AND CODING, PROCEEDINGS, 2005, 3796 : 428 - 441
- [45] Body Sensor Network Security: An Identity-Based Cryptography Approach WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2008, : 148 - 153
- [47] lwEPSep: A Lightweight End-to-end Privacy-preserving Security Protocol for CTI Sharing in IoT Environments JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (05): : 1069 - 1081
- [48] An Efficient Identity-Based Signcryption Scheme for Multiple Receivers ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2009, 5824 : 71 - +
- [49] Efficient Identity-Based Generalized Ring Signcryption Scheme KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (12): : 5553 - 5571
- [50] Efficient and Short Identity-Based Deniable Authenticated Encryption CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 244 - 255