Login / Signup
Secret Sharing Schemes with Applications in Security Protocols.
Sorin Iftene
Published in:
Sci. Ann. Cuza Univ. (2006)
Keyphrases
</>
security protocols
secret sharing scheme
key management
secret sharing
wireless sensor networks
resource constrained
ad hoc networks
automated design
secret key
elliptic curve
real time
databases
energy consumption
routing protocol