×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [n t shares]
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack
40 views
How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack Yitao Duan Computer Science Division, University of
227 views