Login / Signup

Security weakness of a certificate-based proxy signature scheme for IIoT environments.

Je Hong ParkWoo-Hwan Kim
Published in: Inf. Process. Lett. (2024)
Keyphrases