Citation to this article as recorded by
Gao, A., W. Wei and X. Xiao, 2010. Multiple hash Sub-chains: Authentication for the hierarchical sensor networks. Inform. Technol. J., 9: 740-748. CrossRef |
Qiao, B.M., B. Zhou, X.L. Yang, W. Wei and R. Liu, 2010. Improved DV-HOP localization based on better weighted Least-square method. Inform. Technol. J., 9: 1172-1177. CrossRefDirect Link |
Citation to this article as recorded by
Improved DV-HOP localization based on better weighted least-square method. Information Technology Journal Vol. 9, Issue 6, 1172, 2010 |
Multiple hash sub-chains: Authentication for the hierarchical sensor networks. Information Technology Journal Vol. 9, Issue 4, 740, 2010 |
How to cite this article
Chun-Jie Cao, Chao Yang, Xing-Hua Li, Yuan Bo Guo and Jian Feng Ma, 2007. Perfect Forward Secrecy of Authentication and Key Exchange Protocols in Three Versions of WAPI. Information Technology Journal, 6: 1108-1113.
DOI: 10.3923/itj.2007.1108.1113
URL: https://scialert.net/abstract/?doi=itj.2007.1108.1113
DOI: 10.3923/itj.2007.1108.1113
URL: https://scialert.net/abstract/?doi=itj.2007.1108.1113