Publication | Closed Access
Threshold cryptography based on Asmuth–Bloom secret sharing
74
Citations
15
References
2007
Year
EngineeringInformation SecurityCryptographic ProtectionCryptographic TechnologyThreshold CryptographyData PrivacyComputer ScienceSecurity AlgorithmData SecurityCryptography
| Year | Citations | |
|---|---|---|
Page 1
Page 1