Sciweavers

11 search results - page 3 / 3
» From Non-Adaptive to Adaptive Pseudorandom Functions
Sort
View
SASN
2005
ACM
14 years 17 days ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu