Sign in

Identity-based Deniable Authenticated Encryption for E-voting Systems.

Chunhua JinGuanhua ChenJianyang ZhaoShangbing GaoChanghui Yu
Published in: KSII Trans. Internet Inf. Syst. (2019)
Keyphrases
  • computer systems
  • distributed systems
  • key management
  • anomaly detection
  • end to end
  • encryption scheme