Login / Signup
Attacks on One Designated Verifier Proxy Signature Scheme.
Baoyuan Kang
Published in:
J. Appl. Math. (2012)
Keyphrases
</>
proxy signature scheme
designated verifier
signature scheme
security model
signcryption scheme
forward secure
public key
access control
standard model
watermarking scheme
security protocols
security analysis
watermarking algorithm
digital watermarking
security mechanisms
digital signature
secret key
digital images