Sign in

Identity-Based Traitor Tracing.

Michel AbdallaAlexander W. DentJohn Malone-LeeGregory NevenDuong Hieu PhanNigel P. Smart
Published in: Public Key Cryptography (2007)
Keyphrases
  • signcryption scheme
  • key management
  • signature scheme
  • encryption scheme
  • authentication and key agreement
  • case study
  • data sets
  • artificial intelligence
  • image compression
  • provably secure