您当前的位置:
首页 >
文章列表页 >
k-times attribute-based authentication scheme using direct anonymous attestation
Papers | 更新时间:2024-06-05
    • k-times attribute-based authentication scheme using direct anonymous attestation

    • Journal on Communications   Vol. 39, Issue 12, Pages: 113-133(2018)
    • DOI:10.11959/j.issn.1000-436x.2018279    

      CLC: TP393
    • Online First:2018-12

      Published:25 December 2018

    移动端阅览

  • Xin LIU, Qiuliang XU, Bin ZHANG, et al. k-times attribute-based authentication scheme using direct anonymous attestation[J]. Journal on Communications, 2018, 39(12): 113-133. DOI: 10.11959/j.issn.1000-436x.2018279.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

947

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

CP-ABE scheme supporting partially hidden access policy
Attribute-based bilateral access control scheme for cloud storage
Lightweight multi-coupon system for multi-merchant environments with DAA

Related Author

LIU Xia
WANG Xinzu
ZHANG Tao
CHEN Yingge
WANG Rong
FENG Chaosheng
QIN Zhiguang
LI Qi

Related Institution

Department of Computer Science, Sichuan Normal University
College of Digital Art and Design, Chengdu Neusoft University
Network and Data Security Key Laboratory of Sichuan Province,University of Electronic Science and Technology of China
School of Computer Science, Nanjing University of Posts and Telecommunications
Key Laboratory of Cryptography of Zhejiang Province, Hangzhou Normal University
0