Author:
Yang Guomin,Wong Duncan S.,Deng Xiaotie
Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Ateniese, G., Herzberg, A., Krawczyk, H., Tsudik, G.: On traveling incognito. In: Proc. of the IEEE Workshop on Mobile Systems and Applications (December 1994)
2. Bellare, M., Canetti, R., Krawczyk, H.: A modular approach to the design and analysis of authentication and key exchange protocols. In: Proc. 30th ACM Symp. on Theory of Computing, May 1998, pp. 419–428. ACM, New York (1998)
3. Lecture Notes in Computer Science;M. Bellare,1994
4. Lecture Notes in Computer Science;D. Boneh,1998
5. Lecture Notes in Computer Science;R. Canetti,2001
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献