Author:
Sangers Alex,van Heesch Maran,Attema Thomas,Veugen Thijs,Wiggerman Mark,Veldsink Jan,Bloemen Oscar,Worm Daniël
Publisher
Springer International Publishing
Reference28 articles.
1. Lecture Notes in Computer Science;A Aly,2013
2. Barker, E., Barker, W., Burr, W., Polk, W., Smid, M., Zieglar, L.: Recommendation for key management - part 1: General (revision 4). National Institute of Standards and Technology - Special Publication 800(57), 1–156 (2015)
3. Ben-Or, M., Goldwasser, S., Wigderson, A.: Completeness theorems for non-cryptographic fault-tolerant distributed computation (extended abstract). In: Simon, J. (ed.) Proceedings of the 20th Annual ACM Symposium on Theory of Computing, 2–4 May 1988, Chicago, Illinois, USA, pp. 1–10. ACM (1988).
https://doi.org/10.1145/62212.62213
4. Lecture Notes in Computer Science;D Bogdanov,2008
5. Lecture Notes in Computer Science;P Bogetoft,2009
Cited by
24 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献