-
41
Identity authentication scheme based on identity-based encryption
Published 2016-06-01Subjects: Get full text
Article -
42
Host’s source address verification based on stream authentication in the IPv6 access subnet
Published 2013-01-01Subjects: Get full text
Article