Author:
Hsieh Meng-Yen,Lin Hua-Yi,Lai Chin-Feng,Li Kuan-Ching
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Computer Science Applications,Signal Processing
Reference20 articles.
1. Kapoor V, Abraham VS, Singh R: Elliptic curve cryptography. Ubiquity 2008, 9(20):1-8.
2. Haodong W, Bo S, Quan L: Elliptic curve cryptography-based access control in sensor networks. Int J Security Netw 2006, 1(3):127-137. 10.1504/IJSN.2006.011772
3. Kavitha T, Priya SJS, Sridharan D: Design of deterministic key pre distribution using number theory. 3rd International Conference on Electronics Computer Technology (ICECT 2011) 2011, 5: 134-137.
4. Lin X, Sun X, Ho P-H, Shen X: GSIS: a secure and privacy-preserving protocol for vehicular communications. IEEE Trans Veh Technol 2007, 56(6):3442-3456.
5. Amir Y, Kim Y, Nita-Rotaru C, Tsudik G: On the performance of group key agreement protocols. Processing of the 22nd IEEE International Conference on Distributed Computing Systems 2002.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献