A privacy and delegation-enhanced user authentication protocol for Portable Communication Systems
暂无分享,去创建一个
[1] Tzonelih Hwang,et al. Enhanced delegation-based authentication protocol for PCSs , 2009, IEEE Transactions on Wireless Communications.
[2] Dongdai Lin,et al. ID-based designated-verifier proxy signatures , 2005 .
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Chin-Chen Chang,et al. An ElGamal-Like Cryptosystem for Enciphering Large Messages , 2002, IEEE Trans. Knowl. Data Eng..
[5] Huaqun Wang,et al. Cryptanalysis of a Generalized Ring Signature Scheme , 2009, IEEE Transactions on Dependable and Secure Computing.
[6] L. Harn,et al. A non-repudiation metering scheme , 2001, IEEE Communications Letters.
[7] W. Baocang,et al. Public key cryptosystem based on two cryptographic assumptions , 2005 .
[8] M. Rahnema,et al. Overview of the GSM system and protocol architecture , 1993, IEEE Communications Magazine.
[9] Johann van der Merwe,et al. A Fully Distributed Proactively Secure Threshold-Multisignature Scheme , 2007, IEEE Transactions on Parallel and Distributed Systems.
[10] Wei-Bin Lee,et al. A new delegation-based authentication protocol for use in portable communication systems , 2005, IEEE Transactions on Wireless Communications.