Login / Signup
Identity-Based Identification Scheme without Trusted Party against Concurrent Attacks.
Fei Tang
Jiali Bao
Yonghong Huang
Dong Huang
Fuqun Wang
Published in:
Secur. Commun. Networks (2020)
Keyphrases
</>
key distribution
chosen plaintext
signcryption scheme
image watermarking scheme
watermarking scheme
computer security
image quality
distributed environment
multi party
standard model
robust watermarking scheme