Secure Threshold Ring Signature Based on SM9.
Shuang-Gen LiuKang ChenZikang LiuTeng WangPublished in: IEEE Access (2021)
Keyphrases
- threshold selection
- security requirements
- intrusion detection
- security issues
- network intrusion detection
- anomaly detection
- network traffic
- database
- security analysis
- security mechanisms
- adaptive threshold
- identity management
- secret sharing
- authentication protocol
- security protocols
- multi party
- intrusion detection system
- peer to peer