Login / Signup
How to Construct Identity-Based Signatures without the Key Escrow Problem.
Tsz Hon Yuen
Willy Susilo
Yi Mu
Published in:
IACR Cryptol. ePrint Arch. (2009)
Keyphrases
</>
signature scheme
third party
real time
neural network
machine learning
information systems
case study
signature recognition