![]() | ![]() |
2007 | ||
---|---|---|
2 | EE | Katrin Hoeper, Guang Gong: Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks. IJSN 2(3/4): 239-250 (2007) |
2006 | ||
1 | EE | Katrin Hoeper, Guang Gong: Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks. ADHOC-NOW 2006: 224-237 |
1 | Guang Gong | [1] [2] |