메뉴 건너뛰기




Volumn 4307 LNCS, Issue , 2006, Pages 228-237

Quantifying information leakage in tree-based hash protocols

Author keywords

[No Author keywords available]

Indexed keywords

RADIO SYSTEMS;

EID: 84940024494     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11935308_16     Document Type: Conference Paper
Times cited : (28)

References (13)
  • 9
    • 0035504627 scopus 로고    scopus 로고
    • An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes
    • RadhaPoovendran and John S.Baras.An information-theoretic approach for design and analysis of rooted-tree-based multicast key management schemes. IEEE Transactions on Information Theory, 2001.
    • (2001) IEEE Transactions on Information Theory
    • Poovendran, R.1    Baras, J.S.2
  • 12
    • 33750290259 scopus 로고    scopus 로고
    • YA-TRAP: Yet another trivial RFID authentication protocol
    • GeneTsudik. YA-TRAP: Yet another trivial RFID authentication protocol. In PerCom, 2006.
    • (2006) Percom
    • Tsudik, G.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.