Applied Cryptography and Network Security
From MaRDI portal
Publication:4680976
DOI10.1007/B98360zbMATH Open1103.68540OpenAlexW4301861138MaRDI QIDQ4680976FDOQ4680976
Authors: Tao Wan, Evangelos Kranakis, P. C. Van Oorschot
Publication date: 13 June 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98360
Recommendations
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (7)
- Information Security Practice and Experience
- Hop chains: Secure routing and the establishment of distinct identities
- Routing security scheme based on reputation evaluation in hierarchical ad hoc networks
- S-RIP
- Title not available (Why is that?)
- Interception in distance-vector routing networks
- Information and Communications Security
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4680976)