A More Natural Way to Construct Identity-Based Identification Schemes.
https://doi.org/10.1007/978-3-540-72738-5_20
@inproceedings{DBLP:conf/acns/YangCWDW07,
author = {Guomin Yang and
Jing Chen and
Duncan S. Wong and
Xiaotie Deng and
Dongsheng Wang},
editor = {Jonathan Katz and
Moti Yung},
title = {A More Natural Way to Construct Identity-Based Identification Schemes},
booktitle = {Applied Cryptography and Network Security, 5th International Conference,
{ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
series = {Lecture Notes in Computer Science},
volume = {4521},
pages = {307--322},
publisher = {Springer},
year = {2007},
url = {https://doi.org/10.1007/978-3-540-72738-5\_20},
doi = {10.1007/978-3-540-72738-5\_20},
timestamp = {Tue, 20 Aug 2019 15:27:28 +0200},
biburl = {https://dblp.org/rec/conf/acns/YangCWDW07.bib},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
本页面没有标签