Which PKI (public key infrastructure) is the right one? (panel session)
Proceedings of the 7th ACM conference on Computer and communications security
Is hierarchical public-key certification the next target for hackers?
Communications of the ACM - Interactive immersion in 3D graphics
Communications in unknown networks: Preserving the secret of topology
Theoretical Computer Science
On the round complexity of Byzantine agreement without initial set-up
Information and Computation
Fault Reporting in Partially Known Networks and Folk Theorems
Operations Research
Protocols for supporting a public key infrastructure in ad hoc networks
Proceedings of the 11th international conference on Security Protocols
Communications in unknown networks: preserving the secret of topology
SIROCCO'05 Proceedings of the 12th international conference on Structural Information and Communication Complexity
Performance analysis of secure multipath routing protocols for mobile ad hoc networks
WWIC'05 Proceedings of the Third international conference on Wired/Wireless Internet Communications
Multipath routing protocols for mobile ad hoc networks: security issues and performance evaluation
WAC'05 Proceedings of the Second international IFIP conference on Autonomic Communication
Hi-index | 0.00 |