Use of Commutativity for Cryptology in Secret Communication.
Mehmet Emir KoksalPublished in: CoRR (2017)
Keyphrases
- human computer
- computer networks
- resource constrained
- secret sharing
- information systems
- communication protocol
- mobile phone
- communication networks
- instant messaging
- information exchange
- secret information
- databases
- secret sharing scheme
- communication systems
- collaborative learning
- mobile robot
- decision trees
- genetic algorithm
- real world