A blind signature-based protocol for tracing traitors.
J. A. ÁlvarezM. A. LodromanJuan Antonio López RamosPublished in: Int. J. Comput. Math. (2015)
Keyphrases
- lightweight
- intrusion detection
- anomaly detection
- coloured petri nets
- file transfer
- intrusion detection system
- network traffic
- formal analysis
- multi party
- motion deblurring
- network simulator
- application layer
- tcp ip
- security analysis
- cryptographic protocols
- communication protocol
- authentication protocol
- real time
- distributed systems
- information systems