Login / Signup
Secured hierarchical secret sharing using ECC based signcryption.
Atanu Basu
Indranil Sengupta
Jamuna Kanta Sing
Published in:
Secur. Commun. Networks (2012)
Keyphrases
</>
secret sharing
secret sharing scheme
key management
elliptic curve
multi party
encryption scheme
visual cryptography scheme
electronic voting
ad hoc networks
security analysis
signcryption scheme
resource constrained
subband
privacy preserving