Security Analysis of Sm9 Key Agreement and Encryption
The 24 complete entries, which were presented with 8 short contributions, were carefully reviewed and selected from 79 submissions. Contributions present contributions on research advances in all areas of information security, cryptology and their applications. JavaScript is required to retrieve and display references and citations from this record. Note: Providing reference and citation information is only possible through the open metadata APIs provided by crossref.org and opencitations.net. If the citation data for your publications is not yet freely available, ask your publisher to make your citation data available to the public. More information is available in the Initiative for Open Citations (I4OC). Please also note that there is no way to transmit missing references or citation data directly to dblp. ÐÐ3/4лÑÑÑÐ ̧ÑÑ Ð¿ÐμÑаÑÐ1/2ÑÑ Ð²ÐμÑÑÐ ̧Ñ ÑÑÐ3/4й кÐ1/2Ð ̧гР̧ Please also note that this feature is a work in progress and is still far from perfect. That said, especially due to COVID-19, the conference was held online and physically. .
- On March 29, 2022
0 Comments