Author:
Claycomb William R.,Shin Dongwan
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference27 articles.
1. Amtel Corporation, 2009. Amtel ATmega128 〈http://www.atmel.com/dyn/products/product_card.asp?part_id=2018〉.
2. Bertoni GM, Chen L, Fragneto P, Harrison KA, Pelosi G. Computing tate pairing on smartcards, 2005 〈http://www.st.com/stonline/products/families/smartcard/ches2005_v4.pdf〉.
3. Boneh D, Franklin M. Identity-based encryption from the weil pairing. In: Advances in cryptology—CRYPTO; 2001. p. 213–29.
4. Crossbow Technology, 2009. iMote2 〈http://www.xbow.com/Products/Product_pdf_files/Wireless_pdf/Imote2_Datasheet.pdf〉.
5. Douceur JR. The sybil attack. In: IPTPS ’01: revised papers from the first international workshop on peer-to-peer systems. London, UK: Springer-Verlag; 2002. p. 251–60.
Cited by
35 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献