-
1
Analysis and improvement of an identity-based signature scheme from lattices
Published 2015-05-01Subjects: “…identity-based signature…”
Get full text
Article -
2
-
3
User Revocation-Enabled Access Control Model Using Identity-Based Signature in the Cloud Computing Environment
Published 2025-01-01Subjects: Get full text
Article -
4
Efficient traceable identity-based signature scheme
Published 2009-01-01Subjects: Get full text
Article -
5
Integrity checking protocol with identity-based proxy signature in mobile cloud computing
Published 2015-10-01Subjects: Get full text
Article