Author:
Findik Oğuz,Kahramanli Şirzat
Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Dalton, C.I., Griffin, J.F.: Applying military grade security to the Internet. Elsevier Computer Networks and ISDN Systems 29, 1799–1808 (1997)
2. Molva, R.: Internet security architecture. Computer Networks 31, 787–804 (1999)
3. Pasquinucci, A.: Web voting, security and cryptography. Computer Fraud & Security 3, 5–8 (2007)
4. Ahmad, D.R.M., Dubrawsky, I., et al.: Cryptography, Hack Proofing Your Network, 2nd edn., pp. 165–203 (2002)
5. Ning-bo, M., Yu-pu, H., Hai-wen, O.: Broadcast encryption schemes based on RSA. The Journal of China Universities of Posts and Telecommunications 16(1), 69–75 (2009)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献