Système et procédé pour la validation automatisée, l'exécution d'une clé cryptographique, le déploiement et la distribution de certificats
暂无分享,去创建一个
Robert Haas | Rene Pawlitzek | Ilias Iliadis | Christian Cachin | Xiaoyu Hu | Timothy J. Hahn | John T. Peck
[1] Guang Gong,et al. Key revocation based on Dirichlet multinomial model for mobile ad hoc networks , 2008, 2008 33rd IEEE Conference on Local Computer Networks (LCN).
[2] Sirisha Medidi,et al. A lightweight key distribution mechanism for wireless sensor networks , 2008, SPIE Defense + Commercial Sensing.
[3] Kijoon Chae,et al. Key Establishment and Authentication Mechanism for Secure Sensor Networks , 2006, APWeb Workshops.
[4] Stephyn G. W. Butcher,et al. On the Linear Separability of Diagnostic Models , 2006, 2006 IEEE Autotestcon.
[5] Giannis F. Marias,et al. Integrating a Trust Framework with a Distributed Certificate Validation Scheme for MANETs , 2006, EURASIP J. Wirel. Commun. Netw..
[6] Kwong-Sak Leung,et al. An efficient data mining method for learning Bayesian networks using an evolutionary algorithm-based hybrid approach , 2004, IEEE Transactions on Evolutionary Computation.
[7] Shiuh-Pyng Shieh,et al. Scalable and lightweight key distribution for secure group communications , 2004, Int. J. Netw. Manag..