Login / Signup
P-signatures and Noninteractive Anonymous Credentials.
Mira Belenkiy
Melissa Chase
Markulf Kohlweiss
Anna Lysyanskaya
Published in:
TCC (2008)
Keyphrases
</>
access control
signature verification
signature recognition
management system
real time
data sets
databases
data mining
artificial intelligence
signature scheme
digital signature
similar patterns
trust negotiation