"Security analysis of tree and non-tree based group key management schemes ..."

B. R. Purushothama, Nishat Koti (2015)

Details and statistics

DOI: 10.1109/ICACCI.2015.7275882

access: closed

type: Conference or Workshop Paper

metadata version: 2019-09-28

a service of  Schloss Dagstuhl - Leibniz Center for Informatics