| Document Date: 2004-09-30 20:04:09 Open Document File Size: 171,90 KBShare Result on Facebook
City Washington / DC / / Company RSA / Peer / Computer-Communications Networks / Securing Ad Hoc Networks / Gp / Ad Hoc Wireless Networks / Mobile Ad Hoc Networks / / Country United States / / Currency USD / / / Event FDA Phase / / IndustryTerm proactive share update protocol / signature protocol / admissible / network access control protocol / brute-force search / ary search / update / ad-hoc networks / search procedure / search interval / distributed share update protocol / share update protocol / online certification authorities / Wireless Communications / t-bounded offsetting algorithm / proactive protocol / search range narrows / on-line time-stamping services / above protocol / proactive update protocol / designated / search algorithm / update protocol / on-line communities / share update protocols / above share update protocol / threshold signature protocol / fault-tolerant on-line certification authority / zero-knowledge proof protocols / access control protocol / sensor networks / binary search / polynomial time algorithm / et al. protocol / threshold signature generation protocol / partial update protocol / proof protocols / signature algorithm / signature protocols / signature systems / above systems / / Organization Paper Organization / UCLA / Jeong Hyun Yi School of Information / / Person Mi / Jeong Hyun / Mb / Tal Rabin / Mj / / Position Applications General / editor / manager / trusted dealer / Mp / players Mp / player / corrupted player / player Mp / dealer / corrupt player / / Product Herzberg / M1 / M2 / / ProgrammingLanguage Hoc / / Technology share update protocol / distributed share update protocol / URSA share update protocol / threshold signature generation protocol / above protocol / polynomial time algorithm / search algorithm / Peer-to-Peer / signature protocols / Herzberg et al. protocol / Wireless Communications / 4 2 polynomial time algorithm / URSA protocol / access control protocol / P2P / signature algorithm / signing protocol / private key / two protocols / distributed protocol / secret key / proactive protocol / partial update protocol / above share update protocol / resulting protocol / proactive update protocol / network access control protocol / cryptography / so-called t-bounded offsetting algorithm / URSA proactive share update protocol / public key / update protocol / URSA Ad-Hoc Network Access Control Protocol / t-bounded offsetting algorithm / threshold signature protocol / Mobile Computing / signature protocol / proactive share update protocol / http / URSA threshold signature protocol / zero-knowledge proof protocols / share update protocols / Network Protocols / / URL http /
SocialTag |