Author:
He Debiao,Chen Yitao,Chen Jianhua
Funder
Specialized Research Fund
Subject
Computer Science Applications,Modeling and Simulation
Reference29 articles.
1. A. Shamir, Identity based cryptosystems and signature schemes, in: Crypto 1984, 1984, pp. 47–53.
2. S. Al-Riyami, K. Paterson, Certificateless public key cryptography, in: Asiacrypt 2003, 2003, pp. 452–473.
3. An efficient and provably-secure certificateless signature scheme without bilinear pairings;He;International Journal of Communication Systems,2012
4. Cryptanalysis of a certificateless signature scheme without pairings;Tian;International Journal of Communication Systems,2012
5. Weaknesses and improvements of an efficient certificateless signature scheme without using bilinear pairings;Tsai;International Journal of Communication Systems,2012
Cited by
40 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献