Login / Signup
Identity-based Deniable Authenticated Encryption for E-voting Systems.
Chunhua Jin
Guanhua Chen
Jianyang Zhao
Shangbing Gao
Changhui Yu
Published in:
KSII Trans. Internet Inf. Syst. (2019)
Keyphrases
</>
computer systems
distributed systems
key management
anomaly detection
end to end
encryption scheme