Author:
Sun Yinxia,Zhang Futai,Fu Anmin
Publisher
Springer International Publishing
Reference19 articles.
1. Al-Riyami, S.S.: Cryptographic schemes based on elliptic curve pairings. Ph.D. thesis, Royal Holloway, University of London (2004)
2. Lecture Notes in Computer Science;SS Al-Riyami,2003
3. Lecture Notes in Computer Science;D Boneh,2001
4. Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: CCS 2008, pp. 417–426. ACM (2008)
5. Lecture Notes in Computer Science;SSM Chow,2006
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献