Login / Signup
How to construct identity-based signatures without the key escrow problem.
Tsz Hon Yuen
Willy Susilo
Yi Mu
Published in:
Int. J. Inf. Sec. (2010)
Keyphrases
</>
signature scheme
machine learning
third party
key management
data sets
databases
database systems
bayesian networks
standard model
diffie hellman