Author:
Pande Dinesh,Rawat Arjun Singh,Deshmukh Maroti,Singh Maheep
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference58 articles.
1. Forouzan, B. A., & Mukhopadhyay, D. (2015). Cryptography and network security (Vol. 12). New York: McGraw Hill Education (India) Private Limited.
2. Karchmer, M., & Wigderson, A. (1993). On span programs. In [1993] proceedings of the eigth annual structure in complexity theory conference (pp. 102–111). IEEE.
3. Rawat, A. S., & Deshmukh, M. (2021). Computation and communication efficient secure group key exchange protocol for low configuration system. International Journal of Information Technology, 13(3), 839–843.
4. Rawat, A. S., & Deshmukh, M. (2019). Efficient extended Diffie–Hellman key exchange protocol. In International conference on computing, power and communication technologies (GUCON) (pp. 447–451). IEEE.
5. Rawat, A., & Deshmukh, M. (2020). Tree and elliptic curve based efficient and secure group key agreement protocol. Journal of Information Security and Applications, 55, 102599.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献