Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference19 articles.
1. Blom R. An optimal class of symmetric key generation systems. In: Proceedings of EUROCRYPT’84, 1984. p. 335–8.
2. Blundo C, Santis AD, Herzberg A, Kutten S, Vaccaro U, Yung M. Perfectly secure key distribution for dynamic conferences. In: Proceedings of the 12th annual international cryptology conference on advances in cryptology, 1992. p. 471–86.
3. Blundo C, De Santis A, Amir Herzberg, Kutten S, Vaccaro U, Yung M. Perfectly-secure key distribution for dynamic conferences. In: Advances in cryptology–CRYPTO ’92, Lecture Notes in Computer Science, vol. 740, 1993. p. 471–86.
4. Chan HW, Perrig A, Song D. Random key predistribution schemes for sensor networks. In: Proceedings of 2003 IEEE symposium on security and privacy, 2003. p. 197.
5. Self-configurable key pre-distribution in mobile Ad Hoc networks;Claude;Lecture Notes in Computer Science,2005
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献