Security and privacy protocol for emerging smart RFID applications
暂无分享,去创建一个
[1] Piotr Szczechowiak,et al. TinyIBE: Identity-based encryption for heterogeneous sensor networks , 2009, 2009 International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP).
[2] Harald Haas,et al. Proc. of the Wireless Communications and Networking Conference (WCNC) , 2012 .
[3] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[4] Amit K. Awasthi,et al. Proxy Blind Signature Scheme , 2003, IACR Cryptol. ePrint Arch..
[5] Qi Xie,et al. Improvement of ID-based proxy signature scheme without trusted PKG: Improvement of ID-based proxy signature scheme without trusted PKG , 2009 .
[6] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[7] Jacques Stern,et al. Security Arguments for Digital Signatures and Blind Signatures , 2015, Journal of Cryptology.
[8] M. Mambo,et al. Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications) , 1996 .
[9] Li Zhi-bin. Efficient Proxy Blind Multi-signature Scheme , 2008 .
[10] Vladimir Kolesnikov,et al. Key Exchange Using Passwords and Long Keys , 2006, TCC.
[11] B. Clifford Neuman,et al. Proxy-based authorization and accounting for distributed systems , 1993, [1993] Proceedings. The 13th International Conference on Distributed Computing Systems.
[12] Byoungcheon Lee,et al. Strong Proxy Signature and its Applications , 2000 .
[13] Lan Cai-hui. ID-based designated-verifier proxy signature scheme without trusted PKG , 2008 .