Found: 5
Select item for more details and to access through your institution.
Building Group Key Establishment on Group Theory: A Modular Approach.
- Published in:
- Symmetry (20738994), 2020, v. 12, n. 2, p. 197, doi. 10.3390/sym12020197
- By:
- Publication type:
- Article
Secure group key establishment revisited.
- Published in:
- International Journal of Information Security, 2007, v. 6, n. 4, p. 243, doi. 10.1007/s10207-007-0018-x
- By:
- Publication type:
- Article
Key substitution attacks revisited: Taking into account malicious signers.
- Published in:
- International Journal of Information Security, 2006, v. 5, n. 1, p. 30, doi. 10.1007/s10207-005-0071-2
- By:
- Publication type:
- Article
Dependable Over-the-Air Programming.
- Published in:
- Adhoc & Sensor Wireless Networks, 2011, v. 13, n. 3/4, p. 313
- By:
- Publication type:
- Article
Security and Privacy-Enhancing Multicloud Architectures.
- Published in:
- IEEE Transactions on Dependable & Secure Computing, 2013, v. 10, n. 4, p. 212, doi. 10.1109/TDSC.2013.6
- By:
- Publication type:
- Article