Author:
Arboit Geneviève,Crépeau Claude,Davis Carlton R.,Maheswaran Muthucumaru
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference52 articles.
1. F. Stajano, R.J. Anderson, The resurrecting duckling: security issues for ad-hoc wireless networks, in: Proceedings of the 7th International Workshop on Security Protocols, 2000, pp. 172–194.
2. N. Shankar, D. Balfanz, Enabling secure ad-hoc communication using contextaware security services, in: Proceedings of Workshop on Security in Ubiquitous Computing (4 UBICOMP), 2002.
3. How to share a secret?;Shamir;Communications of the ACM,1979
4. B. Chor, S. Goldwasse, S. Micali, B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, in: Proceedings of 26th IEEE Annual Symposium on the Foundations of Computer Science (FOCS), 1985, pp. 383–395.
5. P. Feldman, A practical scheme for non-interactive verifiable secret sharing, in: Proceedings of 28th IEEE Symposium on Foundations of Foundations of Computer Science, 1987, pp. 427–437.
Cited by
31 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献