Login / Signup
Fully Secure and Fast Signing from Obfuscation.
Kim Ramchen
Brent Waters
Published in:
CCS (2014)
Keyphrases
</>
sign language
security requirements
unauthorized access
data sets
data mining
reverse engineering
static analysis
security analysis
data transformation
database systems
security issues
security mechanisms
key management
cryptographic protocols