Login / Signup
Attribute-based ring signatures: Security analysis and a new construction.
Rahim Toluee
Maryam Rajabzadeh Asaar
Mahmoud Salmasizadeh
Published in:
ISCISC (2013)
Keyphrases
</>
security analysis
public key
smart card
security requirements
security model
security properties
high security
digital signature
image encryption
mutual authentication
encryption scheme
designated verifier
authentication protocol
signature scheme
databases
source code
wavelet transform
data mining