Author:
Tian Haibo,Chen Xiaofeng,Jiang Zhengtao
Publisher
Springer Berlin Heidelberg
Reference26 articles.
1. Dwork, C., Naor, M., Sahai, A.: Concurrent Zero Knowledge. Journal of the ACM 51(6), 851–898 (2004)
2. Borisov, N., Goldberg, I., Brewer, E.: Off-the-record communication, or, why not to use PGP. In: Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society (WPES 2004), pp. 77–84. ACM, New York (2004)
3. IPSEC Working Group: Design Rationale for IKEv2. INTERNET-DRAFT, draft-ietf-ipsec-ikev2-rationale-00.txt, http://tools.ietf.org/html/draft-ietf-ipsec-ikev2-rationale-00
4. Shao, Z.: Efficient Deniable Authentication Protocol Based On Generalized Elgamal Signature Scheme. Computer Standards & Interfaces 26(5), 449–454 (2004)
5. Wang, B., Song, Z.: A non-interactive deniable authentication scheme based on designated receiver proofs. Information Sciences 179(6), 858–865 (2009)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献