Author:
Venukumar Vishnu,Pathari Vinod
Subject
Information Systems and Management,Computer Science Applications,Software
Reference22 articles.
1. Improved digital signature scheme based on discrete exponentiation
2. A modular approach to key safeguarding
3. Benaloh, J. D. C. (1987). Verifiable secret-ballot elections (Ph.D. thesis). Yale University, New Haven, CT, USA.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Defensive strategies against PCC attacks based on ideal (t,n)-secret sharing scheme;Journal of King Saud University - Computer and Information Sciences;2023-10
2. Holder-of-key threshold access token for anonymous data resources;2021 IEEE Symposium on Computers and Communications (ISCC);2021-09-05
3. Scalable and robust cryptography approach using cloud computing;Journal of Discrete Mathematical Sciences and Cryptography;2020-06-04
4. Securing light clients in blockchain with DLCP;International Journal of Network Management;2018-12-07