Partially Blind Threshold Signature Based on RSA.
Hung-Yu ChienJinn-ke JanYuh-Min TsengPublished in: Informatica (2003)
Keyphrases
- public key
- intrusion detection
- data sets
- malicious executables
- network traffic
- databases
- key exchange
- data mining
- neural network
- signal processing
- case study
- genetic algorithm
- signature scheme
- information retrieval
- security analysis
- elliptic curve
- thresholding method
- group testing
- threshold selection
- thresholding algorithm