UM

Browse/Search Results:  1-4 of 4 Help

Selected(0)Clear Items/Page:    Sort:
Identity-based group proxy signature scheme in the standard model Journal article
Gu K., Jia W., Li C., Chen R.. Identity-based group proxy signature scheme in the standard model[J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50(7), 1370-1386.
Authors:  Gu K.;  Jia W.;  Li C.;  Chen R.
Favorite |  | Submit date:2019/02/11
CDH problem  Group proxy signature  Identity  Provable security  Security model  
Anonymous authentication without home server in mobile roaming networks Journal article
Jiang C., Jia W., Gu K., Xu N.. Anonymous authentication without home server in mobile roaming networks[J]. Chinese Journal of Electronics, 2013, 22(2), 382-386.
Authors:  Jiang C.;  Jia W.;  Gu K.;  Xu N.
Favorite |  | Submit date:2019/02/11
Anonymous authentication  Group signature  Key exchange  Mobile roaming networks  
Anonymous authentication based on mobile roaming network Journal article
Jiang C., Jia W., Gu K.. Anonymous authentication based on mobile roaming network[J]. Advanced Science Letters, 2012, 7, 95-97.
Authors:  Jiang C.;  Jia W.;  Gu K.
Favorite | TC[Scopus]:0 | Submit date:2019/02/11
Anonymous Authentication  Group Signature  Roaming Network  Wireless Communication  
Efficient authentication protocol using elliptic curve with user anonymity for heterogeneous wireless networks Journal article
Jiang C., Jia W., Gu K.. Efficient authentication protocol using elliptic curve with user anonymity for heterogeneous wireless networks[J]. Journal of Information and Computational Science, 2012, 9(4), 1055-1061.
Authors:  Jiang C.;  Jia W.;  Gu K.
Favorite |  | Submit date:2019/02/11
Anonymous authentication  Elliptic curve  Group signature  Heterogeneous wireless networks