[RDF data]
Home | Example Publications
PropertyValue
dcterms:bibliographicCitation <http://dblp.uni-trier.de/rec/bibtex/conf/securit/AdigaBRSS12>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/B._S._Adiga>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/M._A._Rajan>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/P._Balamuralidhar>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/Ravishankara_Shastry>
dc:creator <https://dblp.l3s.de/d2r/resource/authors/V._L._Shivraj>
foaf:homepage <http://dx.doi.org/doi.org%2F10.1145%2F2490428.2490438>
foaf:homepage <https://doi.org/10.1145/2490428.2490438>
dc:identifier DBLP conf/securit/AdigaBRSS12 (xsd:string)
dc:identifier DOI doi.org%2F10.1145%2F2490428.2490438 (xsd:string)
dcterms:issued 2012 (xsd:gYear)
rdfs:label An identity based encryption using elliptic curve cryptography for secure M2M communication. (xsd:string)
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/B._S._Adiga>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/M._A._Rajan>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/P._Balamuralidhar>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/Ravishankara_Shastry>
foaf:maker <https://dblp.l3s.de/d2r/resource/authors/V._L._Shivraj>
swrc:pages 68-74 (xsd:string)
dcterms:partOf <https://dblp.l3s.de/d2r/resource/publications/conf/securit/2012>
owl:sameAs <http://bibsonomy.org/uri/bibtexkey/conf/securit/AdigaBRSS12/dblp>
owl:sameAs <http://dblp.rkbexplorer.com/id/conf/securit/AdigaBRSS12>
rdfs:seeAlso <http://dblp.uni-trier.de/db/conf/securit/securit2012.html#AdigaBRSS12>
rdfs:seeAlso <https://doi.org/10.1145/2490428.2490438>
swrc:series <https://dblp.l3s.de/d2r/resource/conferences/securit>
dc:title An identity based encryption using elliptic curve cryptography for secure M2M communication. (xsd:string)
dc:type <http://purl.org/dc/dcmitype/Text>
rdf:type swrc:InProceedings
rdf:type foaf:Document