Login / Signup
Asymmetric subversion attacks on signature and identification schemes.
Yi Wang
Rongmao Chen
Chi Liu
Baosheng Wang
Yongjun Wang
Published in:
Pers. Ubiquitous Comput. (2022)
Keyphrases
</>
signature recognition
traffic analysis
countermeasures
automatic identification
java card
data mining
signature scheme
computer security
security threats
terrorist attacks
malicious users
cryptographic algorithms