1 |
H. Y. Chien, C. H. Chen, "A remote authentication scheme preserving user anonymity", IEEE AINA'05, Vol.2, pp. 245-248, 2005.
|
2 |
D. Boneh, M. Franklin, "Identity-based encryption from the weil pairing", CRYPTO, pp. 213-229, 2001.
|
3 |
A. Sahai, B. Waters, "Fuzzy identity-based encryption", Proc. of EUROCRYPT'05, LNCS3494, pp. 457-473, 2005.
|
4 |
이현숙, 유혜정, "스마트카드를 이용한 속성기반 사용자 인증 스킴", 정보보호학회논문지, 제18권, 제5호, pp. 41-47, 2008.
과학기술학회마을
|
5 |
X. Liang, Z. Cao, H. Lin, Jun Shao, "Attribute based proxy re-encryption with delegating capabilities", ASIACCS 2009, Sydney, Australia, 10-12 March 2009. ACM, pp. 276-286, 2009.
|
6 |
M.L. Das, A. Saxena, V.P. Gulati, "A dynamic ID-based remote user authentication scheme", IEEE Transactions on Consumer Electronics, Vol.50, No.2, pp. 629-631, 2004.
DOI
ScienceOn
|
7 |
E.J. Yoon, E.K. Ryu, K.Y. Yoo, "Efficient remote user authentication scheme based on generalized E1Garnal signature scherne", IEEE Transactions on Consumer Electronics, Vol.50, No.2, pp. 568-570, 2004.
DOI
ScienceOn
|