Threshold cryptography in P2P and MANETs: The case of access control
From MaRDI portal
Publication:997196
DOI10.1016/J.COMNET.2007.03.001zbMATH Open1118.68484OpenAlexW2096339596MaRDI QIDQ997196FDOQ997196
Authors: Nitesh Saxena, G. Tsudik, Jeong Hyun Yi
Publication date: 23 July 2007
Published in: Computer Networks (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.comnet.2007.03.001
Recommendations
Data encryption (aspects in computer science) (68P25) Network design and communication in computer systems (68M10)
Cited In (7)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Applied Cryptography and Network Security
- Cryptographic techniques for mobile ad-hoc networks
- Efficient region-based key agreement for peer-to-peer information sharing in mobile ad hoc networks
- Security in Communication Networks
- Efficient verifiable multi-secret sharing scheme based on hash function
This page was built for publication: Threshold cryptography in P2P and MANETs: The case of access control
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q997196)