×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [n threshold scheme]
1 Application of Combinatorial Mathematics to Cryptology: A Personal Journey Ed Dawson Information Security Institute Queensland University of Technology
218 views
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R
214 views
Secure Content Delivery in Information- Centric Networks: Design, Implementation, and Analysis Satysjayant Misra, Reza Tourani, Nahid Ebrahimi Majd Presenter
217 views
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003
215 views