Author:
Liu Bowen,Tang Qiang,Zhou Jianying
Publisher
Springer International Publishing
Reference34 articles.
1. Lecture Notes in Computer Science;M Abdalla,2001
2. Lecture Notes in Computer Science;J Alwen,2009
3. Aumann, Y., Ding, Y.Z., Rabin, M.O.: Everlasting security in the bounded storage model. IEEE Trans. Inf. Theory 48(6), 1668–1680 (2002)
4. Lecture Notes in Computer Science;M Bellare,1994
5. Lecture Notes in Computer Science;S Blake-Wilson,1999
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献