Login / Signup
Anonymity from Public Key Encryption to Undeniable Signatures.
Laila El Aimani
Published in:
AFRICACRYPT (2009)
Keyphrases
</>
public key encryption
public key
digital signature
signature scheme
proxy re encryption
encryption scheme
security analysis
private key
keyword search
database
multiresolution
wireless networks
secure communication