Author:
Wen Yamin,Zhang Fangguo,Wang Huaxiong,Miao Yinbin,Gong Zheng
Publisher
Springer Science and Business Media LLC
Reference40 articles.
1. Jarecki S, Liu X M. Private mutual authentication and conditional oblivious transfer. In: Proceedings of the 29th Annual International Cryptology Conference, Santa Barbara, 2009. 90–107
2. Balfanz D, Durfee G, Shankar N, et al. Secret handshakes from pairing-based key agreements. In: Proceedings of IEEE Symposium on Security and Privacy, Berkeley, 2003. 180–196
3. Ateniese G, Blanton M, Kirsch J. Secret handshakes with dynamic and fuzzy matching. In: Proceedings of Network and Distributed System Security Symposium, 2007. 159–177
4. Sahai A, Waters B. Fuzzy identity-based encryption. In: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques (Advances in Cryptology — EUROCRYPT), St. Petersburg, 2005. 457–473
5. Wen Y M, Gong Z. Private mutual authentications with fuzzy matching. Int J High Performance Syst Archit, 2014, 5: 3–12
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献