Login / Signup
Traceable Policy-Based Signatures with Delegation.
Ismail Afia
Riham AlTawy
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
access control policies
conflict resolution
access control
optimal policy
signature verification
real time
security policies
access control systems
information systems
management system
machine learning
action selection
role based access control
policy making
signature recognition