Login / Signup
Chameleon hash without key exposure based on Schnorr signature.
Wei Gao
Fei Li
Xueli Wang
Published in:
Comput. Stand. Interfaces (2009)
Keyphrases
</>
databases
neural network
social networks
decision trees
data structure
expert systems
high dimensional
digital images
x ray
b tree
hash functions
signature verification