Security of Blind Signatures Revisited.
Dominique SchröderDominique UnruhPublished in: J. Cryptol. (2017)
Keyphrases
- information security
- security requirements
- statistical databases
- intrusion detection
- security policies
- security issues
- security level
- network security
- cyber security
- information assurance
- access control
- data security
- security analysis
- computer security
- authentication protocol
- digital signature
- security systems
- user authentication
- security mechanisms
- security threats
- security management
- network management