共 50 条
- [42] An ID-Based User Authentication Scheme for Cloud Computing 2014 TENTH INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP 2014), 2014, : 98 - 101
- [44] A Dynamic ID-based authentication scheme with smart token 2009 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND SYSTEMS (ICCES 2009), 2009, : 294 - +
- [45] ID-based key agreement and authentication scheme in WLAN Shanghai Jiaotong Daxue Xuebao/Journal of Shanghai Jiaotong University, 2005, 39 (08): : 1327 - 1330
- [47] Deniable authentication protocol based on elliptic curve cryptography 7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 65 - 67
- [48] An ID-Based Mutual Authentication and Key Exchange Protocol for Low-Power Mobile Devices COMPUTER JOURNAL, 2010, 53 (07): : 1062 - 1070
- [50] An Identity-based Restricted Deniable Authentication Protocol 2009 IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS, PROCEEDINGS, 2009, : 474 - 478