Publisher
Springer Nature Singapore
Reference21 articles.
1. Xu, S.: On the security of group communication schemes. J. Comput. Secur. 15, 129–169 (2007). https://doi.org/10.3233/JCS-2007-15106
2. Fatin, A.D., Pavlenko, E.Y., Poltavtseva, M.A.: A survey of mathematical methods for security analysis of cyberphysical systems. Autom. Control Comput. Sci. 54, 983–987 (2021). https://doi.org/10.3103/S014641162008012X
3. Kalinin, M., Krundyshev, V., Rezedinova, E., Zegzhda, P.: Role-based access control for vehicular adhoc networks. In: 2018 IEEE Int. Black Sea Conf. Commun. Networking, BlackSeaCom (2018). https://doi.org/10.1109/BlackSeaCom.2018.8433628
4. Aleksandrova, E.B., Poltavtseva, M.A., Shmatov, V.S.: Ensuring the big data integrity through verifiable zero-knowledge operations. Commun. Comput. Inf. Sci. 1544 CCIS, 211–221 (2022). https://doi.org/10.1007/978-981-16-9576-6_15
5. Karuturi, N.N., Gopalakrishnan, R., Srinivasan, R., Chandrasekaran, P.R.: Foundations of group key management-framework, security model and a generic construction. IACR Cryptology ePrint Archive (2008)