Author: Xu Zhaohu
Publisher: Inderscience Publishers
ISSN: 1747-8405
Source: International Journal of Security and Networks, Vol.7, Iss.3, 2012-03, pp. : 174-180
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
On finite automaton public-key cryptosystem
Theoretical Computer Science, Vol. 226, Iss. 1, 1999-09 ,pp. :
A distributed key generation technique for public key infrastructures
Netnomics, Vol. 2, Iss. 3, 2000-05 ,pp. :
By Chang Kelly Low Richard M. Stamp Mark
Cryptologia, Vol. 38, Iss. 2, 2014-04 ,pp. :