-
1
Rational-security and fair two-party comparison protocol
Published 2023-12-01Subjects: Get full text
Article -
2
On-demand key management based on social attribute for opportunistic networks
Published 2012-12-01Subjects: Get full text
Article