Login / Signup
Towards a security model for computational puzzle schemes.
Qiang Tang
Arjan Jeckmans
Published in:
Int. J. Comput. Math. (2011)
Keyphrases
</>
security model
provably secure
access control
public key
security requirements
security analysis
real time
public key cryptography
designated verifier
artificial intelligence
fine grained