Sign in

Network Coding Signature Schemes Against Related-Key Attacks in the Random Oracle Model.

Jinyong ChangHonglong DaiMaozhi XuRui Xue
Published in: ICISC (2016)
Keyphrases
  • computational complexity
  • intrusion detection