Author:
Yuan Yumin,Zhan Qian,Huang Hua
Publisher
Public Library of Science (PLoS)
Reference28 articles.
1. Boneh D, Gentry C, Shacham H, Lynn B (2003) Aggregate and verifiably encrypted signatures from bilinear maps. In: Proc. Advances in Cryptology – EUROCRYPT 2003, Springer LNCS 2656, 416–432.
2. Lossy data aggregation integrity scheme in wireless sensor networks;S Niu;Computers and Electrical Engineering,2013
3. Bellare M, Namprempre C, Neven G (2007) Unrestricted Aggregate Signatures. In: Proc. 34th International Colloquium on Automata, Languages and Programming (ICALP 2007), Springer LNCS 4596, 411–422.
4. Improvements on an authentication scheme for vehicular sensor networks;JK Liu;Expert Systems with Applications,2014
5. Efficient many-to-one authentication with certificateless aggregate signatures;L Zhang;Computer Networks,2010
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献