Author:
Kaya Kamer,Selçuk Ali Aydın
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference26 articles.
1. A simple threshold authenticated key exchange from short secrets;Abdalla,2005
2. A modular approach to key safeguarding;Asmuth;IEEE Trans. Informat. Theory,1983
3. O. Baudron, P.-A. Fouque, D. Pointcheval, G. Poupard, J. Stern, Practical multi-candidate election system, in: Proc. of PODC 2001, 20th ACM Symposium on Principles of Distributed Computing, 2001, pp. 274–283.
4. Optimal asymmetric encryption;Bellare,1994
5. G. Blakley, Safeguarding cryptographic keys, in: Proc. of AFIPS National Computer Conference, 1979.
Cited by
50 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献