Login / Signup
Security of 2^t-Root Identification and Signatures.
Claus-Peter Schnorr
Published in:
CRYPTO (1996)
Keyphrases
</>
signature recognition
intrusion detection
access control
information security
network security
security issues
security problems
data sets
computer security
security management
security requirements
information systems
statistical databases
functional requirements
data integrity
information assurance