A Survey of the Various Identity-based Encryption Techniques in Wireless Sensor Networks
暂无分享,去创建一个
[1] Li Xu,et al. Hierarchical Identity-Based Online/Offline Encryption , 2008, 2008 The 9th International Conference for Young Computer Scientists.
[2] Yi Mu,et al. Mitigating Phishing with ID-based Online/Offline Authentication , 2008, AISC.
[3] Fuchun Guo,et al. Identity-Based Online/Offline Encryption , 2008, Financial Cryptography.
[4] Craig Gentry,et al. Practical Identity-Based Encryption Without Random Oracles , 2006, EUROCRYPT.
[5] Adi Shamir,et al. Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.
[6] Dan Boneh,et al. Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..
[7] Joonsang Baek,et al. Realizing Stateful Public Key Encryption in Wireless Sensor Network , 2008, SEC.
[8] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[9] Brent Waters,et al. Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.