Login / Signup
On the key dependent message security of DHIES.
Honglong Dai
Luxuan Zhang
Janyan Ji
Jinyong Chang
Maozhi Xu
Published in:
ICAIT (2017)
Keyphrases
</>
high security
intrusion detection
email
network security
security systems
private key
information security
security issues
database
secure communication
statistical databases
computer security
security problems
security requirements
security management
key management
access control
data mining