Publisher
Springer International Publishing
Reference18 articles.
1. Information Security and Cryptography;B Barak,2017
2. Lecture Notes in Computer Science;B Barak,2009
3. Barak, B., Mahmoody-Ghidary, M.: Merkle’s key agreement protocol is optimal: an O(n$${}^{\text{2 }}$$) attack on any key agreement from random oracles. J. Cryptol. 30(3), 699–734 (2017)
4. Lecture Notes in Computer Science;E Biham,2008
5. Chan, H., Perrig, A., Song, D.X.: Random key predistribution schemes for sensor networks. In: 2003 IEEE Symposium on Security and Privacy (S&P 2003), 11–14 May 2003, Berkeley, CA, USA, p. 197. IEEE Computer Society (2003)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献