Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference23 articles.
1. Abdalla, M., Boyen, X., Chevalier, C., & Pointcheval, D. (2009). Distributed public-key cryptography from weak secrets. In S. Jarecki & G. Tsudik (Eds.), PKC 2009. LNCS (Vol. 5443, pp. 139–159). Heidelberg: Springer.
2. https://bitconnect.co/bitcoin-news/201/how-to-secure-bitcoin-wallet.
3. Babaioff, M., Dobzinski, S., Oren, S., & Zohar, A. (2011). On bitcoin and red balloons. http://research.microsoft.com/pubs/156072/bitcoin.pdf
4. Laurent, M., Denouël, J., Levallois-Barth, C., & Waelbroeck, P. (2015). 1—Digital identity. In Digital identity management (pp. 1–45). Elsevier. ISBN 9781785480041. https://doi.org/10.1016/B978-1-78548-004-1.50001-8.
5. Nimbhorkar, S., & Malik, L. (2016). Comparative analysis of authenticated key agreement protocols based on elliptic curve cryptography. Procedia Computer Science, 78, 824–830.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献