Login / Signup
Verifiable and Anonymous Encryption in Asymmetric Bilinear Maps.
Hui Cui
Yi Mu
Man Ho Au
Published in:
TrustCom/ISPA/IUCC (2013)
Keyphrases
</>
sufficient conditions
image encryption
real time
singular value decomposition
encryption scheme
encryption algorithms
multimedia streaming
data sets
database systems
key management
digital signature
secret sharing
data encryption standard