Subject
Signal Processing,Control and Systems Engineering,Software
Reference9 articles.
1. Shamir, A., Identity-based cryptosystems and signature schemes, Advances in Cryptology: Proceedings of CRYPTO 84; Lect. Notes Comput. Sci., 1984, vol. 7, pp. 47–53.
2. Boneh, D. and Franklin, M., Identity-based encryption from the Weil pairing, CRYPTO’01: Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology, 2001, pp. 213–229.
3. E. B. Aleksandrova, Methods of group authentication for low-resource vehicle and flying self-organizing networks, Autom. Control Comput. Sci., 2017, vol. 51, no. 8, pp. 947–958.
4. E. B. Aleksandrova and E. N. Shkorkina, Tripartite outsourcing key-agreement on the bilinear pairings, Autom. Control Comput. Sci., 2016, vol. 50, no. 8, pp. 796–801.
5. Lee, C.-C., Chung, P.-S., and Hwang, M.-S., A survey on attribute-based encryption schemes of access control in cloud environments, Int. J. Network Secur., 2013, vol. 15, no. 4, pp. 231–240.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献