![](https://www.pdfsearch.io/img/49ec1814747a9e0ddf462ce4d0355e45.jpg) Date: 2014-03-04 11:13:59
| | R ESEARCH S UMMARY: D ISTRIBUTED C RYPTOGRAPHY A NIKET K ATE I. Distributed Key Generation and its Applications A trusted authority, in some form, is essential for many secure systems. However, this requirement always leAdd to Reading ListSource URL: crypsys.mmci.uni-saarland.deDownload Document from Source Website File Size: 90,85 KBShare Document on Facebook
|