Login / Signup
How to win the clonewars: efficient periodic n-times anonymous authentication.
Jan Camenisch
Susan Hohenberger
Markulf Kohlweiss
Anna Lysyanskaya
Mira Meyerovich
Published in:
CCS (2006)
Keyphrases
</>
artificial intelligence
computationally expensive
real time
digital images
data mining
genetic algorithm
social networks
multiscale
cloud computing
computationally efficient
cost effective
security requirements
data encryption