Vyzkoušejte nový nástroj s podporou AI
  
        
        Summon Research Assistant
        BETA
      
                    
  
      
    Leakage-resilient identity-based cryptography from minimal assumptions
                                      
                                            Zhou, Yanwei,                              Yang, Bo,                              Qiao, Zirui,                              Xia, Zhe,                              Zhang, Mingwu,                              Mu, Yi                              
Published in Designs, codes, and cryptography (01.11.2023)
                   
      
      
                                                  Published in Designs, codes, and cryptography (01.11.2023)
Get full text
              Journal Article
          
              
          A Review on Identity based Cryptography
                          
                               
                                                Published in                                                International journal of computer applications
             (01.01.2015)                                            
                   
      
      
                                                  Get full text
              Journal Article
          
              
          Enabling Efficient User Revocation in Identity-Based Cloud Storage Auditing for Shared Big Data
                                      
                                            Zhang, Yue,                              Yu, Jia,                              Hao, Rong,                              Wang, Cong,                              Ren, Kui                              
Published in IEEE transactions on dependable and secure computing (01.05.2020)
                   
      
      
                                                  Published in IEEE transactions on dependable and secure computing (01.05.2020)
Get full text
              Journal Article
          
              
          BDSec: Security authentication protocol for BeiDou-II civil navigation message
                                      
                                            Zhijun, Wu,                              Yuan, Zhang,                              Yiming, Yang,                              Peng, Wang,                              Meng, Yue                              
Published in China communications (01.06.2024)
                   
      
      
                                                  Published in China communications (01.06.2024)
Get full text
              Journal Article
          
              
          Simulatable certificateless two-party authenticated key agreement protocol
                                      
                                            Zhang, Lei,                              Zhang, Futai,                              Wu, Qianhong,                              Domingo-Ferrer, Josep                              
Published in Information sciences (15.03.2010)
                   
      
      
                                                  Published in Information sciences (15.03.2010)
Get full text
              Journal Article
          
              
          Efficient three-party authenticated key agreement protocol in certificateless cryptography
                                      
                                            Xiong, Hu,                              Chen, Zhong,                              Qin, Zhiguang                              
Published in International journal of computer mathematics (01.09.2011)
                   
      
      
                                                  Published in International journal of computer mathematics (01.09.2011)
Get full text
              Journal Article
          
              
          Delegating a Pairing Can Be Both Secure and Efficient
                                      
                                            Canard, Sébastien,                              Devigne, Julien,                              Sanders, Olivier                              
Published in Applied Cryptography and Network Security (2014)
                   
      
      
                                                  Published in Applied Cryptography and Network Security (2014)
Get full text
              Book Chapter
          
              
          Against mobile attacks in Mobile Ad-hoc Networks
                                      
                                            Shushan Zhao,                              Aggarwal, A                              
Published in 2010 IEEE International Conference on Information Theory and Information Security (01.12.2010)
                   
      
      
                                                  Published in 2010 IEEE International Conference on Information Theory and Information Security (01.12.2010)
Get full text
              Conference Proceeding