-
1
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
Published 2025-01-01Subjects: Get full text
Article -
2
Outsourced attribute-based encryption with policy update
Published 2016-05-01Subjects: Get full text
Article -
3
Two-party cooperative blind signature based on SM2
Published 2022-12-01Subjects: Get full text
Article -
4
Key security detection based on dynamic binary instrumentation
Published 2017-11-01Subjects: “…key security detection…”
Get full text
Article