Author:
Kaur Harleen,Chauhan Ritu,Afshar Alam M.,Razaqi Naweed Ahmad,Chang Victor
Reference13 articles.
1. Sherwood, R., Bhatacharjee, B., Srinivasan, A.: P5: a protocol for scalable anonymous communication. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 58–70. 12–15 May 2002
2. Chauhan, R., Kaur, H., Lechman, E., Marszk, A.: Big data analytics for ICT monitoring and development. In: Kaur, H., et al. (eds.) Catalyzing Development Through ICT Adoption: The Developing World Experience, pp. 25–36. Springer, New York (2017)
3. Kaur, H., Tao, X.: ICT and Millennium Development Goals: A United Nations Perspective, p. 271. Springer, New York (2014)
4. Diffie, W., Oorschot, P.C.V., Wiener, M.J.: Authentication and authenticated key exchanges. Des. Codes Cryptogr. 2, 107–125 (1992)
5. Goldschlag, D., Reed, M., Syverson, P.: Hiding routing information. In: Proceedings of the 1st International Workshop on Information Hiding, 30 May–01 June, pp. 137–150. Springer (1996)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献