Login / Signup
Constructing Disjoint Paths for Secure Communication.
Amitabha Bagchi
Amitabh Chaudhary
Michael T. Goodrich
Shouhuai Xu
Published in:
DISC (2003)
Keyphrases
</>
secure communication
disjoint paths
smart card
secret key
approximation algorithms
secret sharing
public key
security protocols
undirected graph
key management
ad hoc networks
key technologies
network security
directed graph
chaotic systems
digital signature
special case
resource constrained
computing environments