Login / Signup
Online/Off-line Ring Signature Scheme with Provable Security.
Jayaprakash Kar
Published in:
IACR Cryptol. ePrint Arch. (2014)
Keyphrases
</>
security policies
access control
ring signature scheme
network security
security requirements
security model
designated verifier
information systems
intrusion detection
information security
security analysis