Sign in

Generalized (identity-based) hash proof system and its applications.

Yu ChenZongyang ZhangDongdai LinZhenfu Cao
Published in: Secur. Commun. Networks (2016)
Keyphrases
  • b tree
  • data structure
  • hash functions
  • knowledge base
  • key management
  • key distribution
  • identity based cryptography