Font Size: a A A
Keyword [Threshold schemes]
Result: 1 - 4 | Page: 1 of 1
1. Research Of Proxy Signature Schemes
2. Research On End-to-End Authentication And Encryption Protocols Of Ad Hoc Network
3. Research And Application On Secret Sharing And Proxy Signature
4. Linear threshold schemes, visual cryptography, and parasite-host cryptosystems
  <<First  <Prev  Next>  Last>>  Jump to