-
1
Identity-based cloud storage integrity checking from lattices
Published 2019-04-01Subjects: Get full text
Article -
2
Identity-based cross-domain authentication scheme in pervasive computing environments
Published 2011-01-01Subjects: Get full text
Article -
3
Identity-based group key management scheme for space networks
Published 2010-01-01Subjects: Get full text
Article -
4
Cross-domain authentication scheme based on consortium blockchain
Published 2022-06-01Subjects: Get full text
Article -
5
Efficiency identity-based threshold group signature scheme
Published 2009-01-01Subjects: Get full text
Article -
6
Key establish scheme for optical encryption system based on IBE
Published 2012-04-01Subjects: “…identity-based cryptography…”
Get full text
Article -
7
ABE-IBS based signature-encryption method for WSN
Published 2010-01-01Subjects: Get full text
Article -
8
Anonymous authentication scheme based on one-off public key in pervasive computing environments
Published 2012-02-01Subjects: Get full text
Article -
9
A Blockchain Network Admission Control Mechanism Using Anonymous Identity-Based Cryptography
Published 2024-12-01Subjects: Get full text
Article -
10
Identity-based ring signature scheme under standard model
Published 2008-01-01Subjects: Get full text
Article -
11
ID-based on-line/off-line threshold signature scheme without bilinear pairing
Published 2013-08-01Subjects: Get full text
Article -
12
Identity-based incremental signature scheme from lattices
Published 2021-01-01Subjects: Get full text
Article -
13
On-demand key management based on social attribute for opportunistic networks
Published 2012-12-01Subjects: Get full text
Article -
14
Fare non-repudiation protocol based on identity-based cryptography
Published 2009-01-01Subjects: “…identity-based cryptography…”
Get full text
Article -
15
ID-based efficient and proactive threshold proxy signature in the standard model
Published 2011-01-01Subjects: Get full text
Article -
16
Host’s source address verification based on stream authentication in the IPv6 access subnet
Published 2013-01-01Subjects: Get full text
Article -
17
Efficient traceable identity-based signature scheme
Published 2009-01-01Subjects: “…identity-based cryptography…”
Get full text
Article