Login / Signup
Relations among Privacy Notions for Signcryption and Key Invisible "Sign-then-Encrypt".
Yang Wang
Mark Manulis
Man Ho Au
Willy Susilo
Published in:
ACISP (2013)
Keyphrases
</>
key management
private key
security properties
sensitive data
public key
privacy preserving
private information
privacy preserving data mining
trusted third party
smart card
personal information
secret key
differential privacy
key distribution
security services
secure communication