Practical security for disconnected nodes
暂无分享,去创建一个
[1] Craig Gentry,et al. Hierarchical ID-Based Cryptography , 2002, ASIACRYPT.
[2] Craig Gentry,et al. Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.
[3] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[4] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[5] Yevgeniy Dodis,et al. ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption , 2004, CCS '04.
[6] Kevin R. Fall,et al. A delay-tolerant network architecture for challenged internets , 2003, SIGCOMM '03.
[7] Jörg Ott,et al. A disconnection-tolerant transport for drive-thru Internet environments , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[8] Butler W. Lampson,et al. 31. Paper: Computer Security in the Real World Computer Security in the Real World , 2022 .
[9] Tim Kindberg,et al. An authorization infrastructure for nomadic computing , 2002, SACMAT '02.
[10] Vinton G. Cerf,et al. Delay-tolerant networking: an approach to interplanetary Internet , 2003, IEEE Commun. Mag..