Login / Signup
Generalization of proxy signature based on elliptic curves.
Min-Shiang Hwang
Shiang-Feng Tzeng
Chwei-Shyong Tsai
Published in:
Comput. Stand. Interfaces (2004)
Keyphrases
</>
elliptic curve
efficient computation
scalar multiplication
elliptic curve cryptography
digital signature
anomaly detection
key management
public key cryptography
modular exponentiation
real time
intrusion detection system
network traffic
data sharing