Login / Signup
Signcryption schemes with insider security in an ideal permutation model.
Tarun Kumar Bansal
Xavier Boyen
Josef Pieprzyk
Published in:
J. Math. Cryptol. (2019)
Keyphrases
</>
computational model
high level
mathematical model
probabilistic model
formal model
security model
neural network
similarity measure
management system
statistical model
trust model