Login / Signup
Identity-Based Traitor Tracing.
Michel Abdalla
Alexander W. Dent
John Malone-Lee
Gregory Neven
Duong Hieu Phan
Nigel P. Smart
Published in:
Public Key Cryptography (2007)
Keyphrases
</>
signcryption scheme
key management
signature scheme
encryption scheme
authentication and key agreement
case study
data sets
artificial intelligence
image compression
provably secure