![]() |
| 2007 | ||
|---|---|---|
| 2 | EE | Katrin Hoeper, Guang Gong: Preventing or utilising key escrow in identity-based schemes employed in mobile ad hoc networks. IJSN 2(3/4): 239-250 (2007) |
| 2006 | ||
| 1 | EE | Katrin Hoeper, Guang Gong: Key Revocation for Identity-Based Schemes in Mobile Ad Hoc Networks. ADHOC-NOW 2006: 224-237 |
| 1 | Guang Gong | [1] [2] |