Login / Signup
A Traitor Tracing Scheme Based on the RSA System.
Bo Yang
Hua Ma
Shenglin Zhu
Published in:
Int. J. Netw. Secur. (2007)
Keyphrases
</>
digital signature scheme
real world
key exchange
neural network
database systems
data structure
elliptic curve
private key
authentication scheme
elliptic curve cryptography