-
1
Identity-based encryption
Foilsithe / Cruthaithe 2011Available for University of the Philippines Diliman via SpringerLink. Click here to access
Electronic Resource -
2
-
3
Understanding public-key infrastructure concepts, standards, and deployment considerations
Foilsithe / Cruthaithe 1999LEABHAR -
4