Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
A remark concerning m-divisibility and the discrete logarithm in the divisor class group of curves
Mathematics of Computation
Seven good reasons for mobile agents
Communications of the ACM
Identity-Based and Self-Certified Key-Exchange Protocols
ACISP '97 Proceedings of the Second Australasian Conference on Information Security and Privacy
Secure Transactions with Mobile Agents in Hostile Environments
ACISP '00 Proceedings of the 5th Australasian Conference on Information Security and Privacy
Security for Mobile Agents: Authentication and State Appraisal
ESORICS '96 Proceedings of the 4th European Symposium on Research in Computer Security: Computer Security
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
A One Round Protocol for Tripartite Diffie-Hellman
ANTS-IV Proceedings of the 4th International Symposium on Algorithmic Number Theory
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
IEEE Communications Magazine
Hi-index | 0.00 |
Information Technology (IT) is playing vital role in today's business success. It has been proved that IT services directly effect on business processes performance and organization success. A main factor, which is directly related to IT performance, ...