Login / Signup
Tracing Attacks on U-Prove with Revocation Mechanism.
Lucjan Hanzlik
Przemyslaw Kubiak
Miroslaw Kutylowski
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
countermeasures
computational model
lower bound
security mechanisms
access control
selection mechanism
security risks
malicious users