Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary
From MaRDI portal
Publication:3511161
DOI10.1007/978-3-540-70500-0_13zbMath1279.94111OpenAlexW1494058650MaRDI QIDQ3511161
Madhu Vaidyanathan, Arpita Patra, Ashish Choudhury, C. Pandu Rangan
Publication date: 8 July 2008
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-70500-0_13
Related Items (2)
Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary ⋮ Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Efficient perfectly secure message transmission in synchronous networks
- Proactive secure message transmission in asynchronous networks
- Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary
- On Proactive Perfectly Secure Message Transmission
- Perfectly secure message transmission
- On perfectly secure communication over arbitrary networks
- How to withstand mobile virus attacks (extended abstract)
- Advances in Cryptology – CRYPTO 2004
- Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission
- Truly Efficient 2-Round Perfectly Secure Message Transmission Scheme
- Asymptotically Optimal Two-Round Perfectly Secure Message Transmission
This page was built for publication: Efficient Perfectly Reliable and Secure Message Transmission Tolerating Mobile Adversary