Author:
Behnia Rouzbeh,Yavuz Attila Altay,Ozmen Muslum Ozgur,Yuen Tsz Hon
Publisher
Springer International Publishing
Reference30 articles.
1. Lecture Notes in Computer Science;SS Al-Riyami,2003
2. Au, M.H., Mu, Y., Chen, J., Wong, D.S., Liu, J.K., Yang, G.: Malicious KGC attacks in certificateless cryptography. In: 2nd ACM Symposium on Information, Computer and Communications Security, pp. 302–311. ASIACCS (2007)
3. Lecture Notes in Computer Science;J Baek,2005
4. Behnia, R., Ozmen, M.O., Yavuz, A.A.: ARIS: authentication for real-time IoT systems. In: IEEE International Conference on Communications (ICC), ICC, pp. 1855–1867. ACM, New York (2019)
5. Behnia, R., Ozmen, M.O., Yavuz, A.A., Rosulek, M.: TACHYON: fast signatures from compact knapsack. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, pp. 1855–1867. ACM, New York (2018)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Identity-Based Multiproxy Signature With Proxy Signing Key for Internet of Drones;IEEE Internet of Things Journal;2024-02-01
2. Beyond Basic Trust: Envisioning the Future of NextGen Networked Systems and Digital Signatures;2023 5th IEEE International Conference on Trust, Privacy and Security in Intelligent Systems and Applications (TPS-ISA);2023-11-01