Loading…
Loading…
Loading…
Loading…
A distributed secret share update scheme with public verifiability for ad hoc network
Zhenhua, Chen, Shundong, Li, Qianhong, Wu, Qiong, Huang
Published in Security and communication networks (25.05.2015)
Published in Security and communication networks (25.05.2015)
Get full text
Journal Article
Loading…
Blockchain-Assisted Secure Deduplication for Large-Scale Cloud Storage Service
Hua, Zhongyun, Yao, Yufei, Song, Mingyang, Zheng, Yifeng, Zhang, Yushu, Wang, Cong
Published in IEEE transactions on services computing (01.05.2024)
Published in IEEE transactions on services computing (01.05.2024)
Get full text
Journal Article
Loading…
Loading…
Loading…
Generalised Cumulative Arrays in Secret Sharing
Long, Shoulun, Pieprzyk, Josef, Wang, Huaxiong, Wong, Duncan S.
Published in Designs, codes, and cryptography (01.08.2006)
Published in Designs, codes, and cryptography (01.08.2006)
Get full text
Journal Article
Loading…
A Stochastic Analysis of Secure Joint Decision Processes in Peer-to-Peer Systems
Konig, A., Hollick, M., Steinmetz, R.
Published in IEEE International Conference on Communications (2003) (01.06.2009)
Published in IEEE International Conference on Communications (2003) (01.06.2009)
Get full text
Conference Proceeding
Loading…
Against mobile attacks in Mobile Ad-hoc Networks
Shushan Zhao, Aggarwal, A
Published in 2010 IEEE International Conference on Information Theory and Information Security (01.12.2010)
Published in 2010 IEEE International Conference on Information Theory and Information Security (01.12.2010)
Get full text
Conference Proceeding
Loading…
Security topology in wireless sensor networks with routing optimisation
Ismail, M., Sanavullah, M.Y.
Published in 2008 Fourth International Conference on Wireless Communication and Sensor Networks (01.12.2008)
Published in 2008 Fourth International Conference on Wireless Communication and Sensor Networks (01.12.2008)
Get full text
Conference Proceeding