Go to main content
Formats
Format
BibTeX
MARCXML
TextMARC
MARC
DublinCore
EndNote
NLM
RefWorks
RIS
Cite
Citation

Linked e-resources

Details

Introduction
Some Useful Constructions
Non-scalable Key Distribution Schemes
MLS for Internet Security Protocols
Scalable Key Distribution Schemes
Scalable Extensions of Non-scalable Schemes
Using PKPSs With Tamper-Responsive Modules
Broadcast Authentication and Broadcast Encryption
Authenticated Data Structures
Universal Trusted Computing Bases
Conclusions and References.

Browse Subjects

Show more subjects...

Statistics

from
to
Export