Login / Signup
Super-strong RKA secure MAC, PKE and SE from tag-based hash proof system.
Shuai Han
Shengli Liu
Lin Lyu
Published in:
Des. Codes Cryptogr. (2018)
Keyphrases
</>
data structure
high level
hash functions
security mechanisms
security issues
social networks
recommender systems
user profiles