Related articles 5
Towards ID-Based Authenticated Group Key Exchange Protocol with Identifying Malicious Participants

Order by:   
Select:   All  None    Download:  

Similar articles
   
Pub. online: 1 Jan 2014      Type: Research Article     
Journal:  Informatica Volume 25, Issue 3 (2014), pp. 505–521
   Abstract
   
Pub. online: 1 Jan 2012      Type: Research Article     
Journal:  Informatica Volume 23, Issue 3 (2012), pp. 487–505
   Abstract
   
Pub. online: 1 Jan 2009      Type: Research Article     
Journal:  Informatica Volume 20, Issue 4 (2009), pp. 461–476
   Abstract
   
Pub. online: 1 Jan 2008      Type: Research Article     
Journal:  Informatica Volume 19, Issue 2 (2008), pp. 285–302
   Abstract
   
Pub. online: 1 Jan 2007      Type: Research Article     
Journal:  Informatica Volume 18, Issue 1 (2007), pp. 125–136
   Abstract