Author:
Yao Ming,Foo Ernest,Peng Kun,Dawson Ed
Publisher
Springer Berlin Heidelberg
Reference10 articles.
1. Bellare, M., Yee, B.S.: Forward Integrity for Secure Audit Logs. Technical report. Computer Science and Engineering Department, University of California. San Diego, USA (1995)
2. Lecture Notes in Computer Science;J.S.L. Cheng,2002
3. ElGamal, T.: A Public-Key Cryptosystem and a Signature Scheme based on Discrete Logarithms. IEEE Transactions on Information Theory 31(4), 469–472 (1985)
4. Lecture Notes in Computer Science;G. Karjoth,1998
5. Maggi, P., Sisto, R.: A Configurable Mobile Agent Data Protection Protocol. In: Proceedings of the 2nd International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2003), Melbourne, Australia, pp. 851–858. ACM Press, New York (2003)
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献