Author:
Zhang Junqi,Varadharajan Vijay
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference55 articles.
1. Theory and application of cryptographic techniques;Blom,1985
2. Perfectly-secure key distribution for dynamic conferences;Blundo,1992
3. Boneh D, Franklin M. Identity-based encryption from the weil pairing. In: Advance in cryptology-crypto, Lecture notes in computer science, vol. 2139, 2001. p. 213–29.
4. Boyen X. Multipurpose identity-based signcryption, a Swiss army knife for identity-based cryptography. In: Proceedings of the 23rd international conference on advances in cryptology, Lecture notes in computer science, vol. 2729, 2003. p. 383–399.
5. Securing wireless sensor networks: security architectures;Boyle;Journal of Networks,2008
Cited by
169 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献