Author:
Li Jun,Christianson Bruce,Loomes Martin
Publisher
Springer Berlin Heidelberg
Reference31 articles.
1. Anderson, R.: Why Cryptosystems Fail. Communications of the ACM 37(11), 32–40 (1994)
2. Lecture Notes in Computer Science;J. Arkko,2004
3. Asokan, N., Ginzboorg, P.: Key Agreement in Ad-hoc Networks. Computer Communication Review 23, 1627–1637 (2000)
4. Balfanz, D., Smetters, D., Stewart, P., Wong, H.: Talking to Strangers: Authentication in ad-hoc Wireless Networks. In: Symposium on Nework and Distributed Systems Security (NDSS 2002) (February 2002)
5. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proc. IEEE Conference on Security and Privacy, Oakland, CA, pp. 164–173 (May 1996)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献