Login / Signup
Optimal Security Proofs for Signatures from Identification Schemes.
Eike Kiltz
Daniel Masny
Jiaxin Pan
Published in:
IACR Cryptol. ePrint Arch. (2016)
Keyphrases
</>
optimal solution
intrusion detection
signature recognition
dynamic programming
access control
statistical databases
security issues
security requirements
computer security
information security
security mechanisms
security analysis