Login / Signup
Key exposure free chameleon hash schemes based on discrete logarithm problem.
Seongan Lim
Juhee Lee
Youngjoo An
Published in:
Secur. Commun. Networks (2013)
Keyphrases
</>
group signature scheme
database systems
database
real time
neural network
web services
elliptic curve