Equivocal Blind Signatures and Adaptive UC-Security.
Aggelos KiayiasHong-Sheng ZhouPublished in: TCC (2008)
Keyphrases
- intrusion detection
- network security
- statistical databases
- information security
- information assurance
- signature recognition
- security threats
- security problems
- public key cryptosystem
- security systems
- security model
- security protocols
- computer security
- security mechanisms
- functional requirements
- security issues
- computer networks