Login / Signup
Using group signatures for identity management and its implementation.
Toshiyuki Isshiki
Kengo Mori
Kazue Sako
Isamu Teranishi
Shoko Yonezawa
Published in:
Digital Identity Management (2006)
Keyphrases
</>
identity management
access control
wireless sensor networks
user centric
management system
user interaction