Login / Signup

Controlled Delegation in e-cheques Using Proxy Signatures.

N. R. SunithaB. B. AmberkerPrashant Koulgi
Published in: EDOC (2007)
Keyphrases
  • access control
  • conflict resolution
  • wireless sensor networks
  • security policies
  • signature verification
  • trust management
  • computer controlled
  • access control systems
  • bilinear pairings