Login / Signup
Algebraic MACs and Keyed-Verification Anonymous Credentials.
Melissa Chase
Sarah Meiklejohn
Greg Zaverucha
Published in:
CCS (2014)
Keyphrases
</>
access control
model checking
face verification
formal methods
signature verification
verification method
formal verification
trust negotiation
neural network
concurrent systems
algebraic structure
person identification
peer to peer
bayesian networks
artificial intelligence
machine learning
data mining