Login / Signup
Proxy Signatures Secure Against Proxy Key Exposure.
Jacob C. N. Schuldt
Kanta Matsuura
Kenneth G. Paterson
Published in:
Public Key Cryptography (2008)
Keyphrases
</>
trusted third party
digital signature
neural network
signature recognition
data sets
operating system
third party
formal model
key management
key distribution
ring signature scheme