共 138 条
[1]
Au MH(2013)Secure id-based linkable and revocable-iff-linked ring signature with constant-size construction Theor Comput Sci 469 1-14
[2]
Liu JK(2013)Realizing fully secure unrestricted id-based ring signature in the standard model based on hibe IEEE Trans Inf Forensics Secur 8 1909-1922
[3]
Susilo W(2016)Enabling personalized search over encrypted outsourced data with efficiency improvement IEEE Trans Parallel Distrib Syst 27 2546-2559
[4]
Yuen TH(2015)Achieving efficient cloud search services: multi-keyword ranked search over encrypted cloud data supporting parallel computing IEICE Trans Commun 98 190-200
[5]
Au MH(2015)Enhanced secure mutual authentication and key agreement scheme preserving user anonymity in global mobile networks Wirel Pers Commun 82 2231-2245
[6]
Liu JK(2014)A variable threshold-value authentication architecture for wireless mesh networks J Internet Technol 15 929-935
[7]
Susilo W(2011)Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks Wirel Pers Commun 61 465-476
[8]
Zhou J(2011)A strong user authentication scheme with smart cards for wireless communications Comput Commun 34 367-374
[9]
Fu Z(2014)Cryptanalysis and improvement of an anonymous authentication protocol for wireless access networks Wirel Pers Commun 74 229-243
[10]
Ren K(2013)An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks Wirel Pers Commun 68 1477-1491