Team for Research in
Ubiquitous Secure Technology

GAnGS: Gather, Authenticate 'n Group Securely
Chia-Hsin Chen, Chung-Wei Chen, Cynthia Kuo, Yan-Hao Lai, Jonathan M. McCune, Ahren Studer, Adrian Perrig, Bo-Yin Yang, Tzong-Chen Wu

Citation
Chia-Hsin Chen, Chung-Wei Chen, Cynthia Kuo, Yan-Hao Lai, Jonathan M. McCune, Ahren Studer, Adrian Perrig, Bo-Yin Yang, Tzong-Chen Wu. "GAnGS: Gather, Authenticate 'n Group Securely". Proceedings of ACM Mobicom, September, 2008.

Abstract
(No abstract.)

Electronic downloads

Citation formats  
  • HTML
    Chia-Hsin Chen, Chung-Wei Chen, Cynthia Kuo, Yan-Hao Lai,
    Jonathan M. McCune, Ahren Studer, Adrian Perrig, Bo-Yin
    Yang, Tzong-Chen Wu. <a
    href="http://www.truststc.org/pubs/658.html"
    >GAnGS: Gather, Authenticate 'n Group Securely</a>,
    Proceedings of ACM Mobicom, September, 2008.
  • Plain text
    Chia-Hsin Chen, Chung-Wei Chen, Cynthia Kuo, Yan-Hao Lai,
    Jonathan M. McCune, Ahren Studer, Adrian Perrig, Bo-Yin
    Yang, Tzong-Chen Wu. "GAnGS: Gather, Authenticate 'n
    Group Securely". Proceedings of ACM Mobicom, September,
    2008.
  • BibTeX
    @inproceedings{ChenChenKuoLaiMcCuneStuderPerrigYangWu08_GAnGSGatherAuthenticatenGroupSecurely,
        author = {Chia-Hsin Chen and Chung-Wei Chen and Cynthia Kuo
                  and Yan-Hao Lai and Jonathan M. McCune and Ahren
                  Studer and Adrian Perrig and Bo-Yin Yang and
                  Tzong-Chen Wu},
        title = {GAnGS: Gather, Authenticate 'n Group Securely},
        booktitle = {Proceedings of ACM Mobicom},
        month = {September},
        year = {2008},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/658.html}
    }
    

Posted by Adrian Perrig on 28 Mar 2010.
Groups: trust
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.