A More Natural Way to Construct Identity-Based Identification Schemes.


https://doi.org/10.1007/978-3-540-72738-5_20
@inproceedings{DBLP:conf/acns/YangCWDW07, author = {Guomin Yang and Jing Chen and Duncan S. Wong and Xiaotie Deng and Dongsheng Wang}, editor = {Jonathan Katz and Moti Yung}, title = {A More Natural Way to Construct Identity-Based Identification Schemes}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {307--322}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_20}, doi = {10.1007/978-3-540-72738-5\_20}, timestamp = {Tue, 20 Aug 2019 15:27:28 +0200}, biburl = {https://dblp.org/rec/conf/acns/YangCWDW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

本页面没有标签
本页面最近更新:2020/05/21更新历史
发现错误?想一起完善? 在 GitHub 上编辑此页!
本页面的全部内容在 CC BY-SA 4.0 SATA 协议之条款下提供,附加条款亦可能应用

Copyright © 2016 - 2020 PKU Scholar

最近更新: 52aade4, 2020-05-21