[1] |
PENG Weiping, HAN Ning, SONG Cheng.
Certificateless Identity Authentication Scheme for Internet of Vehicles in Edge Computing Environment
[J]. Journal of Beijing University of Posts and Telecommunications, 2022, 45(1): 46-51.
|
[2] |
TANG Yong-li, WANG Fei-fei, YE Qing, YAN Xi-xi.
Improved Provably Secure Certificateless Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2016, 39(1): 112-116.
|
[3] |
SONG Cheng, LI Jing, PENG Wei-ping, JIA Zong-pu, LIU Zhi-zhong.
Research on Direct Anonymous Attestation Scheme Based on Bilinear Pairing
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(6): 72-76.
|
[4] |
NONG Qiang, HUANG Ru-fen, HUANG Zhen-jie.
Improved for Certificate-Based Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2014, 37(3): 48-52.
|
[5] |
ZHOU Cai-xue.
Cryptanalysis and Improvement of Certificate-Based Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2013, 36(6): 98-101.
|
[6] |
.
Cryptanalysis and Improvement of a Certificateless Strong Proxy Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(5): 115-118.
|
[7] |
.
Provably Secure IdentityBased Signature Scheme in the Standard Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2011, 34(1): 99-102.
|
[8] |
.
Short Signcryption Scheme with Forward Security and Ciphertext Anonymity
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(4): 131-134.
|
[9] |
SUN Shi-feng;WEN Qiao-yan.
An Attack on a Certificateless Strong Proxy Signature Scheme and Its Improvement
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2010, 33(1): 80-83.
|
[10] |
LEI Xin-Feng.
Implement of Chinese-Wall Model Based on an Open Synthetical Security Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2009, 32(3): 73-76.
|
[11] |
DU Hong-zhen1.2, WEN Qiao-yan1, LI Wen-min1, JIN Zheng-ping1.
Efficient Certificateless Strong Proxy Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(6): 18-21.
|
[12] |
LEI Xin-feng1, LIANG Ming-xiao2, LIU Jun1, XIAO Jun-mo1 .
An Open Synthetical Security Model
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(1): 18-21.
|
[13] |
WANG Ling-ling, ZHANG Guo-yin, MA Chun-guang .
A Short Linkable Ring Signature Scheme for E-Cash Protocol
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2008, 31(1): 102-106.
|
[14] |
YU Yong1, YANG Bo2, LI Fa-gen1, ZHANG Ming-wu2.
An Efficient Proxy Ring Signature Scheme
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2007, 30(3): 23-26.
|
[15] |
DAI Yuan-Jun, MA Chun-Guang, YANG Yi-Xian.
An Kind of (t, n)Threshold Secret Sharing Based on Lagrange Insert Value
[J]. JOURNAL OF BEIJING UNIVERSITY OF POSTS AND TELECOM, 2004, 27(2): 24-28.
|