Sign in

Key exposure free chameleon hash schemes based on discrete logarithm problem.

Seongan LimJuhee LeeYoungjoo An
Published in: Secur. Commun. Networks (2013)
Keyphrases
  • group signature scheme
  • database systems
  • database
  • real time
  • neural network
  • web services
  • elliptic curve