Publisher
Springer Science and Business Media LLC
Subject
General Computer Science,Theoretical Computer Science
Reference26 articles.
1. Narayanan A, Rangan C P, Kim K. Practical pay TV schemes. Lecture Notes in Computer Science, 2003, 2727: 192–203
2. Han Y, Gui X, Wu X, and Yang X. Proxy encryption based secure multicast in wireless mesh networks. Journal of Network and Computer Applications, 2011, 34(2): 469–477
3. Li F, Khan M K, Alghathbar K, Takagi T. Identity-based online/offline signcryption for low power devices. Journal of Network and Computer Applications, 2012, 35(1): 340–347
4. Yi X, Batten L. Wireless broadcast encryption based on smart cards. Wireless Networks, 2010, 16(1): 153–165
5. Chourishi D, Seshadri S, Chourishi D. Secure content sharing using third party with broadcast encryption for stateless receivers, In: Proceedings of the 2nd IEEE International Conference on Computer Science and Information. 2009, 528–531
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献