Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants.
Paolo D'ArcoAlfredo De SantisAnna Lisa FerraraBarbara MasucciPublished in: MFCS (2009)
Keyphrases
- security analysis
- information security
- security requirements
- high security
- digital signature scheme
- security issues
- private key
- access control
- authentication scheme
- key distribution
- security systems
- identity based cryptography
- key agreement
- information systems
- security model
- computer security
- intrusion detection
- secret sharing
- authentication protocol
- secure communication
- key management
- blind signature scheme
- cost benefit
- protection scheme
- electronic voting
- security policies
- image quality