News
Work in this paper describes a security mechanism for a mobile adhoc network in a distributed set up. The security technique discussed uses threshold cryptography and proactive secret sharing which ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results