Login / Signup
Dual Form Signatures: An Approach for Proving Security from Static Assumptions.
Michael Gerbush
Allison B. Lewko
Adam O'Neill
Brent Waters
Published in:
IACR Cryptol. ePrint Arch. (2012)
Keyphrases
</>
access control
information security
network security
intrusion detection
security policies
signature recognition
information assurance
real time
electronic commerce
security requirements
signature verification
security level
security threats