-
2
-
-
39049094066
-
IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks
-
Cao X., Kou W., Dang L., and Zhao B. IMBAS: identity-based multi-user broadcast authentication in wireless sensor networks. Computer Communications 31 (2008) 659-667
-
(2008)
Computer Communications
, vol.31
, pp. 659-667
-
-
Cao, X.1
Kou, W.2
Dang, L.3
Zhao, B.4
-
4
-
-
10444220191
-
Efficient identity-based authenticated key agreement protocol from pairings
-
Choie Y.J., Jeong E., and Lee E. Efficient identity-based authenticated key agreement protocol from pairings. Applied Mathematics and Computation 162 (2005) 179-188
-
(2005)
Applied Mathematics and Computation
, vol.162
, pp. 179-188
-
-
Choie, Y.J.1
Jeong, E.2
Lee, E.3
-
5
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
ElGamal T. A public key cryptosystem and a signature scheme based on discrete logarithms. IEEE Transactions on Information IT-31 (1985) 469-472
-
(1985)
IEEE Transactions on Information
, vol.IT-31
, pp. 469-472
-
-
ElGamal, T.1
-
6
-
-
11244267013
-
-
LNCS, Springer-Verlag, New York, USA
-
Hankerson D., Menezes A., and Vanstone S. Guide to elliptic curve cryptography (2004), LNCS, Springer-Verlag, New York, USA
-
(2004)
Guide to elliptic curve cryptography
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
7
-
-
34547541295
-
A remote user authentication scheme using bilinear pairings and ECC
-
Jia Z, Zhang Y, Shao H, Lin Y, Wang J. A remote user authentication scheme using bilinear pairings and ECC. In: Proceedings of the sixth international conference on intelligent system design and applications; 2006. p. 1091-94.
-
(2006)
Proceedings of the sixth international conference on intelligent system design and applications
, pp. 1091-1094
-
-
Jia, Z.1
Zhang, Y.2
Shao, H.3
Lin, Y.4
Wang, J.5
-
9
-
-
0000112683
-
Elliptic curve cryptosystem
-
Koblitz N. Elliptic curve cryptosystem. Mathematics of Computation 48 (1987) 203-209
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
11
-
-
48649086275
-
A secure and efficient scheme of remote user authentication based on bilinear pairings
-
Liao YP, Wang SS. A secure and efficient scheme of remote user authentication based on bilinear pairings. In: Proceedings of 2007 IEEE region 10 conference; 2007. p. 1-4.
-
(2007)
Proceedings of 2007 IEEE region 10 conference
, pp. 1-4
-
-
Liao, Y.P.1
Wang, S.S.2
-
12
-
-
85015402934
-
Use of elliptic curves in cryptography
-
LNCS, Springer-Verlag
-
Miller V.S. Use of elliptic curves in cryptography. Advances in cryptology, proceedings of CRYPTO'85 vol. 218 (1986), LNCS, Springer-Verlag 417-426
-
(1986)
Advances in cryptology, proceedings of CRYPTO'85
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
13
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest R.L., Shamir A., and Adleman L. A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM 21 2 (1978) 120-126
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
14
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
LNCS, Springer-Verlag
-
Shamir A. Identity based cryptosystems and signature schemes. Proceedings of CRYPTO' 84 (1984), LNCS, Springer-Verlag 47-53
-
(1984)
Proceedings of CRYPTO' 84
, pp. 47-53
-
-
Shamir, A.1
-
15
-
-
28244469017
-
Analysis and improvement of authenticated key exchange protocol for sensor networks
-
Tian X., Wong D.S., and Zhu R.W. Analysis and improvement of authenticated key exchange protocol for sensor networks. IEEE Communications Letters 9 11 (2005) 970-972
-
(2005)
IEEE Communications Letters
, vol.9
, Issue.11
, pp. 970-972
-
-
Tian, X.1
Wong, D.S.2
Zhu, R.W.3
|