Lattice Blind Signatures with Forward Security.
Huy Quoc LeDung Hoang DuongWilly SusiloHa Thanh Nguyen TranViet Cuong TrinhJosef PieprzykThomas PlantardPublished in: CoRR (2020)
Keyphrases
- information security
- network security
- intrusion detection
- security issues
- information assurance
- access control
- statistical databases
- security problems
- security policies
- security mechanisms
- security requirements
- computer security
- security level
- security threats
- security management
- security vulnerabilities
- resource constrained
- key management
- security protocols
- security measures
- boolean algebra
- smart card