Login / Signup
Leakage-Resilient Proxy Signatures.
Fei Tang
Hongda Li
Qihua Niu
Bei Liang
Published in:
INCoS (2013)
Keyphrases
</>
signature verification
signature recognition
information retrieval
bilinear pairings
learning algorithm
caching scheme
data sets
neural network
machine learning
search engine
case study
ring signature scheme