Login / Signup

Analysis of Warrant Attacks on Some Threshold Proxy Signature Schemes.

Samaneh Mashhadi
Published in: J. Inf. Process. Syst. (2016)
Keyphrases
  • data analysis
  • standard model
  • proxy signature scheme