Login / Signup

General Weakness in Certain Broadcast Encryption Protocols Employing the Remainder Approach.

Wen Tao Zhu
Published in: ICC (2008)
Keyphrases
  • special case
  • key exchange
  • closely related
  • real time
  • data sets
  • video sequences