Author:
Qiao Lintian,Nahrstedt Klara
Subject
Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Media Technology,Signal Processing
Reference34 articles.
1. Prudent engineering practice for cryptographic protocols;Abadi,1994
2. N. Asokan, M. Schunter, M. Waidner, Optimistic protocols for fair exchange, Proceedings of 4th ACM Conference on Computer and Communications Security, Zurich, April 1997
3. iKP—A family of secure electronic payment protocols;Bellare,1995
4. S. Bellovin, M. Merritt, Limitations of the Kerberos authentication system, Proceedings of USENIX Conference, Winter 1991, 253, 267
5. W. Bender, D. Gruhl, N. Morimoto, Techniques for data hiding, Proceedings of the SPIE Conference on Storage and Retrieval for Image and Video Databases III, San Jose, CA, February 1995, 2420, 164, 173
Cited by
106 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献