Login / Signup
Two Protocols for Member Revocation in Secret Sharing Schemes.
Jia Yu
Fanyu Kong
Xiangguo Cheng
Rong Hao
Published in:
PAISI (2011)
Keyphrases
</>
secret sharing scheme
key management
key distribution
secret sharing
ad hoc networks
resource constrained
wireless sensor networks
multi party
secret key
trusted third party
peer to peer
resource constraints