Login / Signup

Two Protocols for Member Revocation in Secret Sharing Schemes.

Jia YuFanyu KongXiangguo ChengRong Hao
Published in: PAISI (2011)
Keyphrases
  • secret sharing scheme
  • key management
  • key distribution
  • secret sharing
  • ad hoc networks
  • resource constrained
  • wireless sensor networks
  • multi party
  • secret key
  • trusted third party
  • peer to peer
  • resource constraints