Login / Signup
Attribute-based credentials with cryptographic collusion prevention.
Jan Hajny
Petr Dzurenda
Lukas Malina
Published in:
Secur. Commun. Networks (2015)
Keyphrases
</>
smart card
cryptographic protocols
encryption key
security protocols
key management
hash functions
access control
critical information
secure communication
data sets
case study
privacy preserving
encryption scheme
digital signature
s box
website
security properties
databases