Pages that link to "Item:Q1273875"
From MaRDI portal
The following pages link to Perfectly secure key distribution for dynamic conferences (Q1273875):
Displaying 15 items.
- Bounds and constructions for unconditionally secure distributed key distribution schemes for general access structures (Q596095) (← links)
- Perennial secure multi-party computation of universal Turing machine (Q1737594) (← links)
- Chaotic synchronization cryptosystems combined with RSA encryption algorithm (Q1795139) (← links)
- A ramp model for distributed key distribution schemes (Q1811091) (← links)
- Linear broadcast encryption schemes (Q1811106) (← links)
- Improving the trade-off between storage and communication in broadcast encryption schemes (Q1887056) (← links)
- Random key predistribution for wireless sensor networks using deployment knowledge (Q2390947) (← links)
- A unified approach to combinatorial key predistribution schemes for sensor networks (Q2448085) (← links)
- Sharing multiple secrets: Models, schemes and analysis (Q2491290) (← links)
- On \(\tau\)-time secure key agreement (Q2515458) (← links)
- Secure Node Discovery in Ad-hoc Networks and Applications (Q2864180) (← links)
- Leakage Resilience of the Blom’s Key Distribution Scheme (Q2948266) (← links)
- UNCONDITIONALLY SECURE CONFERENCE KEY DISTRIBUTION: SECURITY NOTIONS, BOUNDS AND CONSTRUCTIONS (Q3173476) (← links)
- A power efficient aggregation of encrypted data in wireless sensor network (Q3443222) (← links)
- The highly secure polynomial pool-based key pre-distribution scheme for wireless sensor network (Q5034641) (← links)