Cheating-Tolerant and Threshold-Based Secure Information Exchange Among Propinquity of Adversaries
Author:
Biswas Anindya KumarORCID,
Dasgupta Mou
Publisher
Springer Singapore
Reference17 articles.
1. Li S, Zhuge JW, Li X (2013) Study on BGP security. Chin J Softw 24(1):121–138
2. Saini H, Rao YS, Panda TC (2012) Cyber-crimes and their impacts: a review. Int J Eng Res Appl (IJERA) 2(2):202–209. ISSN: 2248–9622
3. Lagazio M et al (2014) A multi-level approach to understanding the impact of cybercrime on the financial sector. Comput Secur Elsevier 45:58–74
4. Kim J, Tong L, Thomas RJ (2014) Dynamic attacks on power systems economic dispatch. In: 48th Asilomar conference on signals, systems and computers, IEEE, pp 345–349
5. Gutub A, AlKhodaidi T (2020) Smart expansion of target key for more handlers to access multimedia counting-based secret sharing. Multimed Tools Appl 79:17373–17401