Author:
Tan Syh-Yuan,Yau Wei-Chuen,Lim Boon-Hock
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference26 articles.
1. ANSI X9.62-2005 (2005). Elliptic curve digital signature algorithm, ECDSA
2. Carlisle Adams SL (1999) Understanding the Public-key infrastructure: concepts, standards, and deployment considerations, 1st edn. Sams
3. Chen L, Harrison K, Moss A, Soldera D, Smart NP (2002) Certification of public keys within an identity based system. Information security, vol 2433. LNCS, pp 322–333
4. Chen Q, Li Z, Yu S (2007) A cross-authentication model for heterogeneous domains in active networks. IFIP Int Conf Netw Parallel Comput Workshops:140–143
5. Dalton CR (2003) The NHS as a proving ground for cryptosystems. Inf Sec Techn Report 8:73–88
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献