Inproceedings,

Kleptographic Weaknesses in Benaloh-Tuinstra Protocol.

, , , , and .
ICSNC, page 26. IEEE Computer Society, (2006)

Meta data

Tags

Users

  • @dblp

Comments and Reviews