Login / Signup
Revisiting OAKE in the eCK Security Model.
Guangye Sui
Yunlei Zhao
Published in:
CNS (2018)
Keyphrases
</>
security model
public key
access control
security analysis
security requirements
security architecture
provably secure
designated verifier
digital signature
motion estimation
fine grained
smart card
information security
public key cryptography
authentication and key agreement