Author:
Brustoloni José,Garay Juan
Subject
Computer Networks and Communications
Reference32 articles.
1. M. Bellare, R. Canetti and H. Krawczyk, Keyed hash functions and message authentication, in: N. Koblitz (Ed.), Advances in Cryptology — Crypto ’96, Lecture Notes in Computer Science 1109, Springer-Verlag, Berlin, 1996, pp. 1–15.
2. J. Brustoloni and J. Garay, Application-independent end-to-end security in shared-link access networks, in: Proc. IFIP Networking'2000, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 2000.
3. CyberCash, Home page at http://www.CyberCash.com/.
4. Data-Over-Cable Service Interface Specifications, Baseline Privacy Plus Interface Specification, SP-BPI+-101-990316, CableLabs, 1999, available at http://www.cablemodem.com.
5. T. Dierks and C. Allen, The TLS Protocol Version 1.0, IETF, RFC 2246, Jan. 1999.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Empirical study on relationship between informatisation and development of tourism in China;International Journal of Services Technology and Management;2012
2. Digital Library Billing Management System Design and Implementation;Advanced Research on Electronic Commerce, Web Application, and Communication;2011
3. Active routing;IEEE Journal on Selected Areas in Communications;2001-03