ID-based cryptographic schemes based on factoring and discrete logarithms | IEEE Conference Publication | IEEE Xplore