Author:
Liang Weiyou,Wang Yujue,Ding Yong,Liang Hai,Yang Changsong,Wang Huiyong
Publisher
Springer Nature Switzerland
Reference29 articles.
1. Arasan, A., Sadaiyandi, R., Al-Turjman, F., Rajasekaran, A.S., Selvi Karuppuswamy, K.: Computationally efficient and secure anonymous authentication scheme for cloud users. Personal Ubiquit. Comput. 1–11 (2021). https://doi.org/10.1007/s00779-021-01566-9
2. Banerjee, S., Odelu, V., Das, A.K., Chattopadhyay, S., Park, Y.: An efficient, anonymous and robust authentication scheme for smart home environments. Sensors 20(4), 1215 (2020)
3. Camenisch, J., et al.: Specification of the identity mixer cryptographic library. IBM Research-Zurich, pp. 1–48 (2010)
4. Cao, Y.N., Wang, Y., Ding, Y., Guo, Z., Wu, Q., Liang, H.: Blockchain-empowered security and privacy protection technologies for smart grid. Comput. Stand. Interfaces 85, 103708 (2022)
5. Cheng, L., Liu, J., Jin, Y., Li, Y., Wang, W.: Account guarantee scheme: making anonymous accounts supervised in blockchain. ACM Trans. Internet Technol. (TOIT) 21(1), 1–19 (2021)