Login / Signup
Equivocal Blind Signatures and Adaptive UC-Security.
Aggelos Kiayias
Hong-Sheng Zhou
Published in:
IACR Cryptol. ePrint Arch. (2007)
Keyphrases
</>
network security
security threats
neural network
security policies
statistical databases
network management
security issues
intrusion detection
network traffic
security systems
security vulnerabilities