Threshold cryptography in mobile ad hoc networks under minimal topology and setup assumptions
Keyword(s):
Ad Hoc
◽