Login / Signup
Introducing proxy zero-knowledge proof and utilization in anonymous credential systems.
Hoda Jannati
Mahmoud Salmasizadeh
Javad Mohajeri
Amir Moradi
Published in:
Secur. Commun. Networks (2013)
Keyphrases
</>
data mining
management system
learning systems
database
peer to peer
expert systems
distributed systems