Login / Signup

Directed Signatures and Application to Threshold Cryptosystems.

Chae Hoon LimPil Joong Lee
Published in: Security Protocols Workshop (1996)
Keyphrases
  • real world
  • genetic algorithm
  • database
  • real time
  • neural network
  • machine learning
  • information systems
  • case study
  • bayesian networks
  • wireless sensor networks