Login / Signup
An efficient user identification scheme based on ID-based cryptosystem.
Min-Shiang Hwang
Jung-Wen Lo
Shu-Chen Lin
Published in:
Comput. Stand. Interfaces (2004)
Keyphrases
</>
key distribution
elliptic curve
user preferences
cellular automata
user interface
user interaction
signature scheme
public key cryptosystem
diffie hellman
private key
fault tolerant
end users
secret key
user experience
user defined
sensor networks
relevance feedback
provably secure
blind signature
key agreement