Author:
Lin Chao,He Debiao,Huang Xinyi,Choo Kim-Kwang Raymond,Vasilakos Athanasios V.
Funder
National Key Research and Development Program of China
National Natural Science Foundation of China
Guangxi Key Laboratory of Cryptography and Information Security
Natural Science Foundation of Hubei Province of China
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference35 articles.
1. Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams;Aitzhan;IEEE Trans. Dependable Secure Comput.,2016
2. Who am i? secure identity registration on distributed ledgers;Azouvi,2017
3. The security of the cipher block chaining message authentication code;Bellare;J. Comput. Syst. Sci.,2000
4. Randomness re-use in multi-recipient encryption schemeas;Bellare,2003
Cited by
320 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献