Showing 1 - 1 results of 1 for search '"node identity authentication"', query time: 0.04s Refine Results
  1. 1

    Identity authentication scheme based on identity-based encryption by Ren-ji HUANG, Xiao-ping WU, Hong-cheng LI

    Published 2016-06-01
    Subjects: “…node identity authentication…”
    Get full text
    Article