Login / Signup
Controlled Delegation in e-cheques Using Proxy Signatures.
N. R. Sunitha
B. B. Amberker
Prashant Koulgi
Published in:
EDOC (2007)
Keyphrases
</>
access control
conflict resolution
wireless sensor networks
security policies
signature verification
trust management
computer controlled
access control systems
bilinear pairings