共 32 条
[11]
Li X(1985)Identity-based cryptosystems and signature schemes Lect Notes Comput 25 1548-undefined
[12]
Kwon A(2020)Risk management and privacy violation detection in the PoSeID-on data privacy platform SN Comput Sci undefined undefined-undefined
[13]
Lazar D(2020)Novel temporal perturbation-based privacy-preserving mechanism for smart meters Mobile Netw Appl undefined undefined-undefined
[14]
Devadas S(2019)Anonymous authentication key agreement scheme with pairing-based cryptography for home-based multi-sensor Internet of Things Int J Distrib Sensor Netw undefined undefined-undefined
[15]
Li F(undefined)undefined undefined undefined undefined-undefined
[16]
Ma J(undefined)undefined undefined undefined undefined-undefined
[17]
Li J(undefined)undefined undefined undefined undefined-undefined
[18]
Li Y(undefined)undefined undefined undefined undefined-undefined
[19]
Wang G(undefined)undefined undefined undefined undefined-undefined
[20]
Nie L(undefined)undefined undefined undefined undefined-undefined