Hardening digital signatures against untrusted signature software.
Francesco BuccafurriGianluca LaxPublished in: ICDIM (2007)
Keyphrases
- digital signature
- public key
- smart card
- signature scheme
- key management
- blind signature
- elliptic curve
- software architecture
- digital copyright protection
- software systems
- third party
- digital watermarking
- designated verifier signature
- security mechanisms
- data integrity
- low cost
- computer systems
- software development
- resource constrained
- security policies
- blind signature scheme
- database systems