您当前的位置:
首页 >
文章列表页 >
Efficiently non-authenticated group key management protocol withstand interruption attack
更新时间:2024-10-14
    • Efficiently non-authenticated group key management protocol withstand interruption attack

    • Vol. 30, Issue 10, Pages: 75-80(2009)
    • CLC: TN918
    • Published:2009

    移动端阅览

  • XU Peng1, CUI Guo-hua1, ZHENG Ming-hui2. Efficiently non-authenticated group key management protocol withstand interruption attack[J]. 2009, 30(10): 75-80. DOI:

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

741

下载量

3

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Efficient and provably-secure certificateless sequential aggregate signature scheme
Blind signature scheme based on trusted platform computation module
Provably secure certificate less blind proxy re-signatures

Related Author

Zhu WANG
Siqi YANG
Fenghua LI
Kui GENG
Tingting PENG
Mengyao SHI
Wen-ting HUANG
Ling-ling TONG

Related Institution

Institute of Information Engineering, Chinese Academy of Sciences
School of Cyber Security, University of Chinese Academy of Sciences
National Computer Network Emergency Response Technical Team Coordination Centre
School of Computer and Communication, Lanzhou University of Technology
0