On Authentication, Digital Signatures and Signature Laws.
Per KaijserPublished in: Communications and Multimedia Security (1999)
Keyphrases
- digital signature
- security mechanisms
- public key cryptography
- digital watermarking
- trusted third party
- public key
- private key
- smart card
- signature scheme
- key management
- resource constrained
- authentication protocol
- access control
- key distribution
- security analysis
- blind signature
- designated verifier signature
- security issues
- elliptic curve
- security requirements
- digital copyright protection
- blind signature scheme
- digital images
- discrete wavelet transform
- data integrity
- wireless sensor networks
- watermarking scheme
- secret key
- security services
- copyright protection
- watermarking technique
- database
- sensor networks
- security protocols
- designated verifier