Author:
Weis Stephen A.,Sarma Sanjay E.,Rivest Ronald L.,Engels Daniel W.
Publisher
Springer Berlin Heidelberg
Reference33 articles.
1. Abadi, M., Burrows, M., Kaufman, C., Lampson, B.W.: Authentication and Delegation with Smart-cards. In: Theoretical Aspects of Computer Software, pp. 326–345 (1991)
2. Anderson, R., Kuhn, M.: Low Cost Attacks on Tamper Resistant Devices. In: IWSP: International Workshop on Security Protocols. LNCS (1997)
3. Bing, B.: Broadband Wireless Access. Kluwer Academic Publishers, Dordrecht (2002)
4. Lecture Notes in Computer Science;D. Boneh,1997
5. Canetti, R., Micciancio, D., Reingold, O.: Perfectly One-Way Probabilistic Hash Functions. In: 30th Annual ACM Symposium on Theory of Computing, pp. 131–140 (1998)
Cited by
479 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献