Sciweavers

31 search results - page 7 / 7
» Tightly-Secure Signatures from Chameleon Hash Functions
Sort
View
MOBIHOC
2005
ACM
15 years 10 months ago
An efficient scheme for authenticating public keys in sensor networks
With the advance of technology, Public Key Cryptography (PKC) will sooner or later be widely used in wireless sensor networks. Recently, it has been shown that the performance of ...
Wenliang Du, Ronghua Wang, Peng Ning