Login / Signup
How to construct secure proxy cryptosystem.
Yuan Zhou
Binxing Fang
Zhenfu Cao
Xiao-chun Yun
Xiaoming Cheng
Published in:
Inf. Sci. (2007)
Keyphrases
</>
key distribution
cellular automata
private key
public key cryptosystem
public key
key management
elliptic curve
digital signature
trusted third party
power analysis
response time
security requirements
sensitive data
user authentication
group communication
diffie hellman