Author:
Hong S.-M.,Lee S.,Park Y.,Cho Y.,Yoon H.
Subject
Computer Networks and Communications
Reference26 articles.
1. C. Boyd, A. Mathuria, Key establishment protocols for secure mobile communications: a selective survey, in ACISP’98, Lecture Notes in Computer Science, vol. 1438, 1998, pp. 344–355.
2. Computer Security and Industrial Cryptography, LNCS741;Vedder,1993
3. K. Buchanan, R. Fudge, D. McFarlane, T. Phillips, A. Sasaki, H. Xia, IMT-2000: Service Provider's Perspective, IEEE Personal Communications, vol. 4, August 1997.
4. ISO, Open systems interconnection reference model-part 2: Security architecture, ISO International Standard, 7498-2, 1988.
5. Principles of key management;Fumy;IEEE Journal on Selected Areas in Communications,1993
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献