From post

Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks.

, , , , и . Euro-Par, том 5168 из Lecture Notes in Computer Science, стр. 601-610. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Filtering false data via authentic consensus in vehicle ad hoc networks., , , , и . Int. J. Auton. Adapt. Commun. Syst., 3 (2): 217-235 (2010)Further Improvement of An Authentication Scheme with User Anonymity for Wireless Communications., , и . Int. J. Netw. Secur., 14 (5): 297-300 (2012)Securing key issuing in peer-to-peer networks., , , , , , и . SAC, стр. 84-85. ACM, (2009)On the security of an identity based multi-proxy signature scheme., , , и . Comput. Electr. Eng., 37 (2): 129-135 (2011)Automatic Construction and Optimization of Layered Network Attack Graph., , , и . TeNe, стр. 135-138. Springer, (2008)New construction of identity-based proxy re-encryption., , и . Digital Rights Management Workshop, стр. 47-50. ACM, (2010)When ABE Meets RSS., , , и . DBSec, том 6166 из Lecture Notes in Computer Science, стр. 319-326. Springer, (2010)PKU-STRAW-L: A Simulative Platform Evaluate the Power-Saving Rate of the Intelligent Street Lamp System., , , , и . UIC/ATC, стр. 525-532. IEEE Computer Society, (2012)MisDis: An Efficent Misbehavior Discovering Method Based on Accountability and State Machine in VANET., , , , , и . APWeb, том 7808 из Lecture Notes in Computer Science, стр. 583-594. Springer, (2013)Produre: A Novel Proximity Discovery Mechanism in Location Tagging System., , , , , и . CISIS, том 6694 из Lecture Notes in Computer Science, стр. 238-245. Springer, (2011)