Please use this identifier to cite or link to this item:
http://localhost/handle/Hannan/431196
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | Ma, Rick | en_US |
dc.contributor | Cheng, Samuel | en_US |
dc.date | 2008 | en_US |
dc.date.accessioned | 2020-05-18T12:30:53Z | - |
dc.date.available | 2020-05-18T12:30:53Z | - |
dc.date.issued | 2008 | en_US |
dc.identifier.issn | 1409107 | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/415741 | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/431196 | - |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | In 2009, Han et al.proposed anefficient threshold self-healing key distribution scheme with sponsorization for infrastructureless wireless networks. They claimed that the key distribution scheme satisfies the forward security, i.e., any inter- nal user wh | en_US |
dc.relation.haspart | AL341876.pdf | en_US |
dc.subject | Science & Technology | en_US |
dc.subject.other | 10.1109/TCSVT.2011.2125630 | en_US |
dc.title | Transactions Letters | en_US |
dc.type | Article | en_US |
dc.journal.title | October | en_US |
Appears in Collections: | 2002-2008 |
Files in This Item:
File | Size | Format | |
---|---|---|---|
AL341876.pdf | 398.18 kB | Adobe PDF |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | Ma, Rick | en_US |
dc.contributor | Cheng, Samuel | en_US |
dc.date | 2008 | en_US |
dc.date.accessioned | 2020-05-18T12:30:53Z | - |
dc.date.available | 2020-05-18T12:30:53Z | - |
dc.date.issued | 2008 | en_US |
dc.identifier.issn | 1409107 | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/415741 | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/431196 | - |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | In 2009, Han et al.proposed anefficient threshold self-healing key distribution scheme with sponsorization for infrastructureless wireless networks. They claimed that the key distribution scheme satisfies the forward security, i.e., any inter- nal user wh | en_US |
dc.relation.haspart | AL341876.pdf | en_US |
dc.subject | Science & Technology | en_US |
dc.subject.other | 10.1109/TCSVT.2011.2125630 | en_US |
dc.title | Transactions Letters | en_US |
dc.type | Article | en_US |
dc.journal.title | October | en_US |
Appears in Collections: | 2002-2008 |
Files in This Item:
File | Size | Format | |
---|---|---|---|
AL341876.pdf | 398.18 kB | Adobe PDF |
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor | Ma, Rick | en_US |
dc.contributor | Cheng, Samuel | en_US |
dc.date | 2008 | en_US |
dc.date.accessioned | 2020-05-18T12:30:53Z | - |
dc.date.available | 2020-05-18T12:30:53Z | - |
dc.date.issued | 2008 | en_US |
dc.identifier.issn | 1409107 | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/415741 | en_US |
dc.identifier.uri | http://localhost/handle/Hannan/431196 | - |
dc.description | en_US | |
dc.description | en_US | |
dc.description.abstract | In 2009, Han et al.proposed anefficient threshold self-healing key distribution scheme with sponsorization for infrastructureless wireless networks. They claimed that the key distribution scheme satisfies the forward security, i.e., any inter- nal user wh | en_US |
dc.relation.haspart | AL341876.pdf | en_US |
dc.subject | Science & Technology | en_US |
dc.subject.other | 10.1109/TCSVT.2011.2125630 | en_US |
dc.title | Transactions Letters | en_US |
dc.type | Article | en_US |
dc.journal.title | October | en_US |
Appears in Collections: | 2002-2008 |
Files in This Item:
File | Size | Format | |
---|---|---|---|
AL341876.pdf | 398.18 kB | Adobe PDF |