Threshold MACs. / Martin, Keith M.; Pieprzyk, J.; Safavi-Naini, R.; Wang, H.; Wild, P.R.

Information Security and Cryptology - ICISC 2002. Vol. 2587 Springer, 2003. p. 237-252 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingChapter

Published
Original languageEnglish
Title of host publicationInformation Security and Cryptology - ICISC 2002
PublisherSpringer
Pages237-252
Number of pages16
Volume2587
DOIs
Publication statusPublished - 2003

Publication series

NameLecture Notes in Computer Science
This open access research output is licenced under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.

ID: 1297176