Refereed paperModified Chen-Hwang identity-based conference key broadcast schemes with user authentication
References (8)
- et al.
Identity-based conference key broadcast schemes with user authentication
Computers & Security
(1994) - et al.
- et al.
Identity-based conference key distribution systems
- et al.
Security of improved identity-based conference key distribution systems
There are more references available in the full text version of this article.
Cited by (1)
Conference key distribution scheme based on the theory of quadratic residues
1999, Computer Communications
Copyright © 1997 Published by Elsevier Ltd.