Login / Signup
From Proxy Encryption Primitives to a Deployable Secure-Mailing-List Solution.
Himanshu Khurana
Jin Heo
Meenal Pant
Published in:
ICICS (2006)
Keyphrases
</>
mailing lists
encryption scheme
security analysis
email
open source software
key management
cryptographic protocols
private key
key exchange
artificial intelligence
social media
data collection
digital signature
authentication scheme
image encryption
public key cryptography