TTS without Revocation Capability Secure Against CCA2.
Chong Hee KimYong Ho HwangPil Joong LeePublished in: ACISP (2004)
Keyphrases
- key management
- text to speech
- canonical correlation analysis
- key distribution
- public key cryptography
- security issues
- security requirements
- blind signature
- security model
- authentication scheme
- identity management
- covert channel
- semi supervised
- trusted third party
- cryptographic protocols
- security analysis
- public key
- information security