-
1
Identity based and key insulated cryptosystem
Published 2009-01-01Subjects: “…identity-based cryptosystem…”
Get full text
Article -
2
Analysis and improvement on identity-based cloud data integrity verification scheme
Published 2018-11-01Subjects: Get full text
Article -
3
Research on wormhole attacks in wireless mesh networks
Published 2011-01-01Subjects: Get full text
Article -
4
Identity-based efficient authentication and key agreement protocol for mobile Internet
Published 2017-08-01Subjects: “…identity-based cryptosystem…”
Get full text
Article