Login / Signup
Defeating Malicious Servers in a Blind Signatures Based Voting System.
Sébastien Canard
Matthieu Gaud
Jacques Traoré
Published in:
Financial Cryptography (2006)
Keyphrases
</>
anti virus
signature verification
malicious behavior
voting schemes
databases
data center
database
malicious traffic
malware detection
voting method
service times
majority voting
detecting malicious
continuous media
signature recognition
ip addresses
voting scheme
computer security
neural network
traffic patterns