Login / Signup

Analysis of Sun et al.'s linkability attack on some proxy blind signature schemes.

Lin-Chuan WuYi-Shiung YehTsann-Shyong Liu
Published in: J. Syst. Softw. (2006)
Keyphrases
  • blind signature scheme
  • anomaly detection
  • databases
  • response time