Source-location privacy full protection in wireless sensor networks
From MaRDI portal
Publication:2195316
DOI10.1016/j.ins.2018.02.064zbMath1440.68027OpenAlexW2789881828WikidataQ130156281 ScholiaQ130156281MaRDI QIDQ2195316
Bharat K. Bhargava, Junsong Fu, Na Wang, Ji-Wen Zeng
Publication date: 8 September 2020
Published in: Information Sciences (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.ins.2018.02.064
Cryptography (94A60) Privacy of data (68P27) Wireless sensor networks as related to computer science (68M18)
Cites Work
- Unnamed Item
- The use of mathematical linguistic methods in creating secret sharing threshold algorithms
- Recent progress on the elliptic curve discrete logarithm problem
- Attacks to some verifiable multi-secret sharing schemes and two improved schemes
- A new \((t,n)\) multi-secret sharing scheme based on Shamir's secret sharing
- Essentially Optimal Robust Secret Sharing with Maximal Corruptions
- The Discrete Logarithm Problem
- An Information Theoretic Approach to Secret Sharing
- How to share a secret
- A Combinatorial Approach to Threshold Schemes