Author:
Denzel Michael,Ryan Mark Dermot
Publisher
Springer International Publishing
Reference19 articles.
1. Amir, Y., Kim, Y., Nita-Rotaru, C., Tsudik, G.: On the performance of group key agreement protocols. ACM Trans. Inf. Syst. Secur. (TISSEC) 7(3), 457–488 (2004)
2. Bessani, A.N., Sousa, P., Correia, M., Neves, N.F., Verissimo, P.: The crutial way of critical infrastructure protection. IEEE Secur. Priv. 6(6), 44–51 (2008)
3. Bokareva, T., Bulusu, N., Jha, S.: SASHA: toward a self-healing hybrid sensor network architecture. In: The Second IEEE Workshop on Embedded Networked Sensors, pp. 71–78. Citeseer (2005)
4. Boneh, D., Ding, X., Tsudik, G.: Identity-based mediated RSA. In: 3rd Workshop on Information Security Application [5]
5. Boneh, D., Ding, X., Tsudik, G., Wong, C.M.: A method for fast revocation of public key certificates and security capabilities. In: USENIX Security Symposium (2001)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献