Exploració per tema "Threshold cryptography"
Ara es mostren els items 1-2 de 2
Accés restringit per política de l'editorialSeveral alternative schemes have been presented in the literature to try to solve the users’ admission problem in P2P systems when it is not possible to include a logically centralized authority (either online or ...
Accés obertThe goal of a signcryption scheme is to achieve the same functionalities as encryption and signature together, but in a more efficient way than encrypting and signing separately. To increase security and reliability in ...