Sign in

Convertible Undeniable Proxy Signatures: Security Models and Efficient Construction.

Wei WuYi MuWilly SusiloXinyi Huang
Published in: WISA (2007)
Keyphrases
  • access control
  • information systems
  • prior knowledge
  • complex systems
  • statistical models
  • information security
  • security mechanisms
  • computer security