Anonymous Traceability Schemes with Unconditional Security.
Reihaneh Safavi-NainiYejing WangPublished in: INDOCRYPT (2000)
Keyphrases
- digital signature scheme
- security requirements
- security policies
- software architecture
- life cycle
- information security
- provably secure
- key management
- key agreement
- security issues
- security level
- intrusion detection
- security threats
- security systems
- key management scheme
- security properties
- mobile commerce
- security management
- security model
- key agreement protocol
- computer security
- functional requirements
- electronic transactions
- network security
- access control
- information systems
- trusted platform module
- public key encryption
- tool support
- elliptic curve
- security mechanisms
- sensitive data
- public key
- peer to peer
- distributed systems
- case study