您当前的位置:
首页 >
文章列表页 >
Analysis and construction for threshold signature scheme based on game theory
Academic paper | 更新时间:2024-06-05
    • Analysis and construction for threshold signature scheme based on game theory

    • Journal on Communications   Vol. 36, Issue 5, Pages: 148-155(2015)
    • DOI:10.11959/j.issn.1000-436x.2015189    

      CLC: TP309
    • Online First:2015-05

      Published:25 May 2015

    移动端阅览

  • ANGJie W, AIYong-quan C, IANYou-liang T. Analysis and construction for threshold signature scheme based on game theory[J]. Journal on Communications, 2015, 36(5): 148-155. DOI: 10.11959/j.issn.1000-436x.2015189.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

2260

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Network security situational awareness model based on threat intelligence
Game theory based forwarding control method for social network
Analysis of DRM game control
Fairly verifiable multi-user homomorphic proxy re-encryption scheme
Rational-security and fair two-party comparison protocol

Related Author

Hongbin ZHANG
Yan YIN
Dongmei ZHAO
Bin LIU
Fangfang SHAN
Hui LI
Hui ZHU
Guo-jun MA

Related Institution

Research Center of Big Data and Social Computing, Hebei University of Science and Technology
School of Economics and Management, Hebei University of Science and Technology
Hebei Key Laboratory of Network and Information Security, Hebei Normal University
School of Information Science and Engineering, Hebei University of Science and Technology
State Key Laboratory of Integrated Service Network
0