Search Result Save to File Save as CSV
Your search for 38231 returns 3927 document(s)
An efficient tree-based group key agreement using bilinear map, (LNCS-Lecture Notes in Computer Science 2576) Hal 357-371
Author: Sangwon Lee; Yongdae Kim; Kwangjo Kim; Dae-Hyun Ryu; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Making the key agreement protocol in mobile ad hoc network more efficient, (LNCS-Lecture Notes in Computer Science 2576) Hal 343-356
Author: Gang Yao; Kui Ren; Feng Bao; Robert H.Deng; Dengguo Feng; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
On a class of key agreement protocols which cannot be unconditionally secure, (LNCS-Lecture Notes in Computer Science 2576) Hal 133-145
Author: Frank Niedermeyer; Werner Schindler; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A key recovery mechanism for reliable group key management, (LNCS-Lecture Notes in Computer Science 2576) Hal 372-386
Author: Taenam Cho; Sang-Ho Lee; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A group key distribution scheme with decentralised user join, (LNCS-Lecture Notes in Computer Science 2576) Hal 146-163
Author: Hartono Kurnio; Rei Safavi-Naini; Huaxiong Wang; | Call Number: 005.8 Sec | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient distributed signcryption scheme as group signcryption, (LNCS-Lecture Notes in Computer Science 2576) Hal 403-417
Author: DongJin Kwak; SangJae Moon; | Call Number: 005.8 Zho a | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Tripartite authenticated key agreement protocols from pairings, (LNCS-Lecture Notes in Computer Science 2898), Hal. 332-344
Author: S.S. Al. Riyami and K.G. Pterson; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
A Computationally-efficient construction for the matrix-based key distribution in sensor networks, (LNCS-Lecture Notes in Computer Science 5576) Hal. 190-199
Author: Abeldelaziz Mohaisen; Nam-Su Jho; Dowon Hong; | Call Number: 005.8 Adv | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 167-182
Author: Dae Hyun Yum and Pil Joong Lee; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Cryptanalysis of the public key cryptosystem based, Efficient key updating signaturn schemes based on IBS, LNCS-Lecture Notes in Computer Science 2898), Hal. 234-244
Author: George Petricles; | Call Number: 005.82 Cry | Type: Indeks Artikel LNCS
Find Similar |  Add To Favorites |  Detail in New Window 
Prev   1 2 3 4 5 6 7 8 9 10  Next