A Mechanism of Authentication for P2P-SIP Overlays
暂无分享,去创建一个
Xiaolin Liu | Jie Xu | Jie Xu | Xiaolin Liu
[1] Lei Zhang,et al. On the security of a certificateless signature scheme , 2010, 2010 2nd International Conference on Signal Processing Systems.
[2] Jan Seedorf. Security challenges for peer-to-peer SIP , 2006, IEEE Network.
[3] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[4] Shaohui Wang,et al. A Certificateless Signature and Group Signature Schemes against Malicious PKG , 2008, 22nd International Conference on Advanced Information Networking and Applications (aina 2008).
[5] Chuang Lin,et al. sStream: Peer-to-Peer Live Streaming with Efficient User Authentication and Key Management , 2007, 2007 Second International Conference on Communications and Networking in China.
[6] Duncan S. Wong,et al. Certificateless Public-Key Signature: Security Model and Efficient Construction , 2006, ACNS.
[7] Minyi Guo,et al. An Effective Trust Establishment Scheme for Authentication in Mobile Ad Hoc Networks , 2007, 7th IEEE International Conference on Computer and Information Technology (CIT 2007).
[8] Dong Hoon Lee,et al. A new provably secure certificateless short signature scheme , 2011, Comput. Math. Appl..
[9] Kenneth G. Paterson,et al. Certificateless Public Key Cryptography , 2003 .
[10] Zhuoming Jiang,et al. A P2P Network Authentication Method Based on CPK , 2009, 2009 Second International Symposium on Electronic Commerce and Security.
[11] Yi Mu,et al. On the Security of Certificateless Signature Schemes from Asiacrypt 2003 , 2005, CANS.
[12] Lei Zhang,et al. A New Provably Secure Certificateless Signature Scheme , 2008, 2008 IEEE International Conference on Communications.