Login / Signup

Towards a security model for computational puzzle schemes.

Qiang TangArjan Jeckmans
Published in: Int. J. Comput. Math. (2011)
Keyphrases
  • security model
  • provably secure
  • access control
  • public key
  • security requirements
  • security analysis
  • real time
  • public key cryptography
  • designated verifier
  • artificial intelligence
  • fine grained