Server-aided immediate and robust user revocation mechanism for SM9

Article Properties
Abstract
Cite
Sun, Shuzhou, et al. “Server-Aided Immediate and Robust User Revocation Mechanism for SM9”. Cybersecurity, vol. 3, no. 1, 2020, https://doi.org/10.1186/s42400-020-00054-6.
Sun, S., Ma, H., Zhang, R., & Xu, W. (2020). Server-aided immediate and robust user revocation mechanism for SM9. Cybersecurity, 3(1). https://doi.org/10.1186/s42400-020-00054-6
Sun S, Ma H, Zhang R, Xu W. Server-aided immediate and robust user revocation mechanism for SM9. Cybersecurity. 2020;3(1).
Journal Categories
Science
Mathematics
Instruments and machines
Electronic computers
Computer science
Science
Mathematics
Instruments and machines
Electronic computers
Computer science
Computer software
Science
Science (General)
Cybernetics
Information theory
Technology
Electrical engineering
Electronics
Nuclear engineering
Electronics
Computer engineering
Computer hardware
Refrences
Title Journal Journal Categories Citations Publication Date
10.1109/TC.2013.208 2013
Generic Constructions of Identity-Based and Certificateless KEMs Journal of Cryptology
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Technology: Technology (General): Industrial engineering. Management engineering: Applied mathematics. Quantitative methods
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
28 2008
A practical revocation scheme for broadcast encryption using smartcards

ACM Transactions on Information and System Security 6 2006
OpenMP: an industry standard API for shared-memory programming IEEE Computational Science and Engineering 1,146 1998
Sakai, R, Kasahara M (2003) Id based cryptosystems with pairing on elliptic curve. IACR Cryptol ePrint Arch 2003:54. 2003
Citations
Title Journal Journal Categories Citations Publication Date
Fault-tolerant identity-based encryption from SM9 Science China Information Sciences
  • Science: Science (General): Cybernetics: Information theory
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electric apparatus and materials. Electric circuits. Electric networks
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
2024
A Novel Approach to Strengthening Web-Based Cloud Services: Two-Factor Access Control

E3S Web of Conferences
  • Geography. Anthropology. Recreation: Environmental sciences
2024
Registered Keyword Searchable Encryption Based on SM9

Applied Sciences
  • Technology: Engineering (General). Civil engineering (General)
  • Science: Biology (General)
  • Science: Physics
  • Science: Chemistry
  • Science: Chemistry: General. Including alchemy
  • Technology: Engineering (General). Civil engineering (General)
  • Science: Chemistry
  • Science: Physics
  • Technology: Technology (General): Industrial engineering. Management engineering
  • Technology: Chemical technology
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Materials of engineering and construction. Mechanics of materials
  • Technology: Engineering (General). Civil engineering (General)
2023
Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9

The Computer Journal
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Science (General): Cybernetics: Information theory
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science: Computer software
  • Technology: Electrical engineering. Electronics. Nuclear engineering: Electronics: Computer engineering. Computer hardware
  • Science: Mathematics: Instruments and machines: Electronic computers. Computer science
3 2021
Citations Analysis
The category Science: Science (General): Cybernetics: Information theory 2 is the most commonly referenced area in studies that cite this article. The first research to cite this article was titled Provably Secure Online/Offline Identity-Based Signature Scheme Based on SM9 and was published in 2021. The most recent citation comes from a 2024 study titled Fault-tolerant identity-based encryption from SM9. This article reached its peak citation in 2024, with 2 citations. It has been cited in 4 different journals, 50% of which are open access. Among related journals, the Science China Information Sciences cited this research the most, with 1 citations. The chart below illustrates the annual citation trends for this article.
Citations used this article by year