Efficient and Adaptive Threshold Signatures for Ad hoc networks (Q2864187): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
Changed an Item
ReferenceBot (talk | contribs)
Changed an Item
 
(2 intermediate revisions by 2 users not shown)
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.entcs.2006.11.012 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2159646418 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a function securely / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035739 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Security in Communication Networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364569 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Robust and efficient sharing of RSA functions. / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2782036 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249323 / rank
 
Normal rank
Property / cites work
 
Property / cites work: A method for obtaining digital signatures and public-key cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4869527 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3374942 / rank
 
Normal rank

Latest revision as of 03:57, 7 July 2024

scientific article
Language Label Description Also known as
English
Efficient and Adaptive Threshold Signatures for Ad hoc networks
scientific article

    Statements

    Efficient and Adaptive Threshold Signatures for Ad hoc networks (English)
    0 references
    0 references
    0 references
    0 references
    6 December 2013
    0 references
    0 references
    0 references
    0 references
    0 references
    threshold cryptosystem
    0 references
    signature scheme
    0 references
    secret sharing
    0 references
    peer-to-peer network
    0 references
    ad hoc networks
    0 references
    wireless network
    0 references
    ubiquitous service
    0 references
    0 references