Login / Signup
Efficient proxy signatures based on trapdoor hash functions.
Santosh Chandrasekhar
Saikat Chakrabarti
Mukesh Singhal
Kenneth L. Calvert
Published in:
IET Inf. Secur. (2010)
Keyphrases
</>
hash functions
hashing algorithm
computationally expensive
databases
lightweight
binary codes
machine learning
similarity search
order preserving
provably secure
locality sensitive
approximate similarity search