Login / Signup
Asynchronous Secure Communication Tolerating Mixed Adversaries.
K. Srinathan
M. V. N. Ashwin Kumar
C. Pandu Rangan
Published in:
ASIACRYPT (2002)
Keyphrases
</>
secure communication
smart card
secret key
secret sharing
public key
key management
security protocols
ad hoc networks
digital signature
network security
chaotic systems
computing environments
key technologies
key distribution
secret sharing scheme