Login / Signup
Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary.
Ashish Choudhary
Arpita Patra
B. V. Ashwinkumar
K. Srinathan
C. Pandu Rangan
Published in:
ICITS (2008)
Keyphrases
</>
secure communication
computing environments
smart card
secret key
secret sharing
key management
public key
network security
ad hoc networks
security protocols
digital signature
cost effective
adaptive control
digital images
secret sharing scheme
closed loop
mobile agent system