Author:
Kester Quist-Aphetsi,Nana Laurent,Pascu Anca Christine,Gire Sophie,Eghan Jojo M.,Quaynor Nii Narku
Publisher
Springer International Publishing
Reference11 articles.
1. Pedersen, I.: Ready to wear (or not): examining the rhetorical impact of proposed wearable devices. In: IEEE International Symposium on Technology and Society (ISTAS), 2013, pp. 201–202, 27–29 June 2013
2. Balfour, R.E., Donnelly, B.P.: The what, why and how of achieving urban telepresence. In: Systems, Applications and Technology Conference (LISAT), IEEE Long Island, pp. 1, 6, 3–3 May 2013. doi:
10.1109/LISAT.2013.6578234
3. Huang, Y.J., Liu, F.H., Yang, B.Y.: Public-key cryptography from new multivariate quadratic assumptions. In: Fischlin M., Buchmann J., Manulis M. (eds.) Proceedings of the 15th International Conference on Practice and Theory in Public Key Cryptography (PKC’12), pp. 190–205. Springer, Berlin
4. Applebaum, B., Barak, B., Wigderson, A.: Public-key cryptography from different assumptions. In: Proceedings of the Forty-Second ACM Symposium on Theory of Computing (STOC’10), pp. 171–180. ACM, New York (2010)
5. Asghar, M.N., Ghanbari, M.: MIKEY for keys management of H. 264 scalable video coded layers. J. King Saud Univ. Comput. Inf. Sci. 24(2), 107–116 (2012)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献