Author:
Rawat Arjun Singh,Deshmukh Maroti
Reference12 articles.
1. Boyd C, Mathuria A (2013) Protocols for authentication and key establishment. Springer Science and Business Media
2. Forouzan BA, Mukhopadhyay D (2011) Cryptography and network security (Sie). McGraw-Hill Education
3. Stallings W (2006) Cryptography and network security, 4/E. Pearson Education India
4. Stinson DR (2005) Cryptography: theory and practice. Chapman and Hall/CRC
5. Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inform Theory 22(6):644–654
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献