Author:
Li Yifa,Chen Duo,Xue Mengyang
Publisher
Springer Nature Singapore
Reference24 articles.
1. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976). https://doi.org/10.1109/TIT.1976.1055638
2. Ellison, C., Schneier, B.: Ten risks of PKI: what you’re not being told about public key infrastructure. Comput Secur J 16(1), 1–7 (2000)
3. Kar, J.: Provably Secure Online/Off-line Identity-Based Signature Scheme for Wireless Sensor Network. Cryptology ePrint Archive (2012)
4. Paterson, K.G., Price, G.: A comparison between traditional public key infrastructures and identity-based cryptography. Inf. Secur. Tech. Rep. 8(3), 57–72 (2003)
5. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakley, G.R., Chaum, D. (eds.) Advances in Cryptology, pp. 47–53. Springer, Berlin (1985). https://doi.org/10.1007/3-540-39568-7_5