Towards Practical Security of Pseudonymous Signature on the BSI eIDAS Token.
Miroslaw KutylowskiLucjan HanzlikKamil KluczniakPublished in: IACR Cryptol. ePrint Arch. (2018)
Keyphrases
- digital copyright protection
- intrusion detection
- information security
- access control
- practical application
- neural network
- security issues
- security requirements
- security problems
- real world
- signature recognition
- security threats
- security level
- cyber security
- security policies
- signature verification
- security management
- statistical databases
- security measures
- blind signature scheme
- information assurance
- ring signature scheme