First Page | Document Content | |
---|---|---|
Date: 2014-03-04 11:13:59 | R ESEARCH S UMMARY: D ISTRIBUTED C RYPTOGRAPHY A NIKET K ATE I. Distributed Key Generation and its Applications A trusted authority, in some form, is essential for many secure systems. However, this requirement always leAdd to Reading ListSource URL: crypsys.mmci.uni-saarland.deDownload Document from Source WebsiteFile Size: 90,85 KBShare Document on Facebook |