相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。Efficient Identity-Based Provable Multi-Copy Data Possession in Multi-Cloud Storage
Jiguo Li et al.
IEEE TRANSACTIONS ON CLOUD COMPUTING (2022)
Certificateless Public Integrity Checking of Group Shared Data on Cloud Storage
Jiguo Li et al.
IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)
Cryptanalysis and Improvement for Certificateless Aggregate Signature
Jiguo Li et al.
FUNDAMENTA INFORMATICAE (2018)
A Short Linearly Homomorphic Proxy Signature Scheme
Qun Lin et al.
IEEE ACCESS (2018)
Identity-Based Encryption with Outsourced Revocation in Cloud Computing
Jin Li et al.
IEEE TRANSACTIONS ON COMPUTERS (2015)
An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Vehicular Ad Hoc Networks
Debiao He et al.
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)
Cryptanalysis and improvement of a certificateless aggregate signature scheme
Lin Cheng et al.
INFORMATION SCIENCES (2015)
An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks
Shi-Jinn Horng et al.
INFORMATION SCIENCES (2015)
Notes on the security of certificateless aggregate signature schemes
Futai Zhang et al.
INFORMATION SCIENCES (2014)
Insecurity of an efficient certificateless aggregate signature with constant pairing computations
Debiao He et al.
INFORMATION SCIENCES (2014)
New Construction of Efficient Certificateless Aggregate Signatures
He Liu et al.
INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS (2014)
An efficient certificateless aggregate signature with constant pairing computations
Hu Xiong et al.
INFORMATION SCIENCES (2013)
An Efficient Pseudonymous Authentication Scheme With Strong Privacy Preservation for Vehicular Communications
Yipin Sun et al.
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY (2010)
An ID-based aggregate signature scheme with constant pairing computations
Kyung-Ah Shim
JOURNAL OF SYSTEMS AND SOFTWARE (2010)
A new certificateless aggregate signature scheme
Lei Zhang et al.
COMPUTER COMMUNICATIONS (2009)
Securing mobile ad hoc networks with certificateless public keys
Yanchao Zhang et al.
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2006)