Login / Signup
IP Address Authorization for Secure Address Proxying Using Multi-key CGAs and Ring Signatures.
James Kempf
Jonathan Wood
Zulfikar Ramzan
Craig Gentry
Published in:
IWSEC (2006)
Keyphrases
</>
ip address
security requirements
access control
conflict resolution
security mechanisms
digital signature
secure communication
factor authentication
real time
signature scheme
data mining
data processing
security policies
security analysis
security protocols
physical location