Author:
Xia Fei,Mao Jiaming,Shao Zhipeng,Xu Liangjie,Zhao Ran,Yang Yunzhi
Publisher
Springer International Publishing
Reference12 articles.
1. Lecture Notes in Computer Science;A Shamir,1985
2. Boldyreva, A., Goyal, V, Kumar, V.: Identity-based encryption with efficient revocation. In: Proceedings of the 15th ACM conference on Computer and communications security, TaiPai Taiwan, pp. 417–426. ACM (2008)
3. Lecture Notes in Computer Science;MH Au,2008
4. Xie, Y., Xu, F., Li, X., Zhang, S., Zhang, X., et al.: Eias: an efficient identity-based aggregate signature scheme for WSNS against coalition attack. Comput. Mater. Continua 59(3), 903–924 (2019)
5. Ge, C., Xia, J., Fang, L.: Key-private identity-based proxy re-encryption. Comput. Mater. Continua 63(2), 633–647 (2020)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. An Optimized Blockchain Model for Secure and Efficient Data Management in Internet of Things*;2024 IEEE International Conference on Information Technology, Electronics and Intelligent Communication Systems (ICITEICS);2024-06-28