Login / Signup
A New Attack for Self-Certified Digital Signatures for E-commerce Applications.
Chin-Yu Sun
Hsiao-Ling Wu
Hung-Min Sun
TingTing Hwang
Published in:
J. Inf. Sci. Eng. (2021)
Keyphrases
</>
digital signature
smart card
public key
secret key
key management
authentication protocol
security mechanisms
elliptic curve
signature scheme
blind signature scheme
digital watermarking
data integrity
security analysis
resource constrained
ciphertext
security model
information security
databases