Author:
Yao Lin,Wang Lei,Kong Xiangwei,Wu Guowei,Xia Feng
Subject
Computational Mathematics,Computational Theory and Mathematics,Modeling and Simulation
Reference13 articles.
1. A privacy preserving access control scheme using anonymous identification for ubiquitous environments;Diep,2007
2. Pervasive computing — kurz erklärt;Ferscha;Datenbank-Spektrum,2003
3. Icsa Guide to Cryptography;Nichols,1998
4. Compact and unforgeable key establishment over an atm network;Zheng;Proceedings of the IEEE,1998
5. P.F. Syverson, P.C. van Oorschot, On unifying some cryptographic protocol logics, in: 1994 IEEE Computer Society Symposium on Research in Security and Privacy, 1994, pp. 14–28.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献