共 50 条
[1]
Homomorphic MACs: MAC-Based Integrity for Network Coding
[J].
APPLIED CRYPTOGRAPHY AND NETWORK SECURITY,
2009, 5536
:292-+
[2]
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[3]
Alaybeyi S., 2016, Pragmatic strategies to improve industrial iot security
[4]
[Anonymous], 1984, Advances in Cryptology: Proceedings of CRYPTO 84, Lecture Notes in Computer Science, DOI DOI 10.1007/3-540-39568-7
[5]
[Anonymous], 2019, SHOCK VIB
[6]
Attrapadung N, 2011, LECT NOTES COMPUT SC, V6571, P17, DOI 10.1007/978-3-642-19379-8_2
[8]
Boneh D, 2011, LECT NOTES COMPUT SC, V6632, P149, DOI 10.1007/978-3-642-20465-4_10
[9]
Boneh D, 2011, LECT NOTES COMPUT SC, V6571, P1, DOI 10.1007/978-3-642-19379-8_1
[10]
Boneh D, 2009, LECT NOTES COMPUT SC, V5443, P68