ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Deriving, Attacking and Defending the GDOI Protocol
Computer Security – ESORICS 2004 - Lecture Notes in Computer Science
◽
10.1007/978-3-540-30108-0_4
◽
2004
◽
pp. 53-72
◽
Cited By ~ 22
Author(s):
Catherine Meadows
◽
Dusko Pavlovic
Start Chat
Download Full-text
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close