Author:
Hadian Dehkordi Massoud,Ghasemi Reza
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference29 articles.
1. Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612–613.
2. Blakley, G. R. (1899). Safeguarding cryptographic keys. In International workshop on managing requirements knowledge (pp. 313–313). IEEE Computer Society.
3. Yao, A. C. (1982). Protocols for secure computations. In 2013 IEEE 54th annual symposium on foundations of computer science (pp. 160–164). IEEE.
4. Wang, Y., Wong, D. S, Wu, Q., Chow, S. S. M, Qin, B., & Liu, J. (2014). Practical distributed signatures in the standard model. In Topics in cryptology—CT-RSA 2014 (pp. 307–326). Springer.
5. Shieh, S.-P., Lin, C.-T., Yang, W.-B., & Sun, H.-M. (2000). Digital multisignature schemes for authenticating delegates in mobile code systems. IEEE Transactions on Vehicular Technology, 49(4), 1464–1473.
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献