Cryptography and network security (2nd ed.): principles and practice
Cryptography and network security (2nd ed.): principles and practice
A new dynamic key generation scheme for access control in a hierarchy
Nordic Journal of Computing
On Zhang's Nonrepudiable Proxy Signature Schemes
ACISP '98 Proceedings of the Third Australasian Conference on Information Security and Privacy
ICICS '97 Proceedings of the First International Conference on Information and Communication Security
Hi-index | 0.00 |