Sciweavers

11 search results - page 3 / 3
» From Non-Adaptive to Adaptive Pseudorandom Functions
Sort
View
SASN
2005
ACM
13 years 11 months ago
On the security of group communication schemes based on symmetric key cryptosystems
Many emerging applications in both wired and wireless networks, such as information dissemination and distributed collaboration in an adversarial environment, need support of secu...
Shouhuai Xu