Cited By
View all- Syed FGupta SHamood Alsamhi SRashid MLiu X(2021)A survey on recent optimal techniques for securing unmanned aerial vehicles applicationsTransactions on Emerging Telecommunications Technologies10.1002/ett.413332:7Online publication date: 5-Jul-2021
- Buckley NNagar AArumugam S(2016)On the use of secret sharing as a secure multi-use padInnovations in Systems and Software Engineering10.1007/s11334-016-0273-y12:3(215-225)Online publication date: 1-Sep-2016
- Dolev SGilboa NLi XBao FMiller SChow SYao D(2015)Accumulating Automata and Cascaded Equations Automata for Communicationless Information Theoretically Secure Multi-Party ComputationProceedings of the 3rd International Workshop on Security in Cloud Computing10.1145/2732516.2732526(21-29)Online publication date: 14-Apr-2015
- Show More Cited By