| 1. | Ideal functionality for identity - based encryption schemes 基于身份的公钥加密的理想功能 |
| 2. | A survey of identity - based cryptography using pairing 使用对技术的基于身份密码学研究综述 |
| 3. | A hierarchical identity - based cryptosystem 一个基于分级身份的密码系统 |
| 4. | A broadcast encryption scheme using hierarchical identity - based encryption 一种基于身份分层结构加密算法的广播加密方案 |
| 5. | Identity - based cryptography applied in wireless local network security protocol 基于身份密码体制在无线局域网安全协议中的应用 |
| 6. | 2 ateniese g , de medeiros b . identity - based chameleon hash and applications . in proc 然而,根据两个原象值可以用来计算出指定接收者的私钥 |
| 7. | Information technology - security techniques - digital signatures with appendix - identity - based mechanisms 信息技术.安全技术.带附录的数字签名.基于等同的机构 |
| 8. | Information technology - security techniques - digital signatures with appendix - part 2 : identity - based mechanisms 信息技术安全技术带附录的数字签名第2部分:基于身份的机制 |
| 9. | Information technology - security techniques - digital signatures with appendix - part 2 : identity - based mechanisms 信息技术.安全技术.带附件的数字签名.第2部分:基于识别的机构 |
| 10. | There are currently about 17 identity - based branches of feminism including black feminism and marxist feminism 依身份不同,现今女权主义约有十七个分支,包括黑人女权主义及马克思女权主义。 |