您当前的位置:
首页 >
文章列表页 >
Anonymous authentication scheme based on one-off public key in pervasive computing environments
academic paper | 更新时间:2024-06-05
    • Anonymous authentication scheme based on one-off public key in pervasive computing environments

    • Journal on Communications   Vol. 33, Issue 2, Pages: 93-98(2012)
    • DOI:1000-436X(2012)02-0093-06    

      CLC: TP309
    • Online First:2012-02

      Published:25 February 2012

    移动端阅览

  • Chang-yuan LUO, Shi-wei HUO, Hong-zhi XING. Anonymous authentication scheme based on one-off public key in pervasive computing environments[J]. Journal on Communications, 2012, 33(2): 93-98. DOI: 1000-436X(2012)02-0093-06.

  •  
  •  

0

Views

1035

下载量

3

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Identity-based cross-domain authentication scheme in pervasive computing environments
Efficient pseudonym certificate distribution scheme for Internet of vehicles based on novel sanitizable multi-signature
Lightweight PUF-based anonymous authentication protocol in V2G
Distributed anonymous authentication scheme based on the blockchain in VANET
Efficient revocable certificateless remote anonymous authentication protocol for wireless body area network

Related Author

XING Hong-zhi
HUO Shi-wei
LUO Chang-yuan
ZHAO Yunlei
NING Jianting
YANG Yafang
LIU Zhaoman
HE Jiahui

Related Institution

Electronic Technology Institute,Information Engineering University
State Key Laboratory of Cryptography
School of Cyber Science and Engineering, Wuhan University
College of Computer Science and Technology, Fudan University
School of Communication and Information Engineering, Chongqing University of Posts and Telecommunications
0