An identity based-identification scheme with tight security against active and concurrent adversaries

J Chia, JJ Chin - IEEE Access, 2020 - ieeexplore.ieee.org
Identification schemes are used by machines to securely authenticate the identity of other
machines or their users over computer networks. As conventional public key schemes …

An Identity Based-Identification Scheme With Tight Security Against Active and Concurrent Adversaries

JJ Chin, J Chia - IEEE Access, 2020 - shdl.mmu.edu.my
Identification schemes are used by machines to securely authenticate the identity of other
machines or their users over computer networks. As conventional public key schemes …

[引用][C] An Identity Based-Identification Scheme With Tight Security Against Active and Concurrent Adversaries

J Chia, JJ Chin - IEEE Access, 2020 - ui.adsabs.harvard.edu
An Identity Based-Identification Scheme With Tight Security Against Active and Concurrent
Adversaries - NASA/ADS Now on home page ads icon ads Enable full ADS view NASA/ADS …

[PDF][PDF] An Identity Based-Identification Scheme With Tight Security Against Active and Concurrent Adversaries

J CHIA, JIJ CHIN - scholar.archive.org
Identification schemes are used by machines to securely authenticate the identity of other
machines or their users over computer networks. As conventional public key schemes …

An Identity Based-Identification Scheme With Tight Security Against Active and Concurrent Adversaries

JJ Chin, J Chia - IEEE Access, 2020 - shdl.mmu.edu.my
Identification schemes are used by machines to securely authenticate the identity of other
machines or their users over computer networks. As conventional public key schemes …