Login / Signup

Security Analysis of Offline E-cash Systems with Malicious Insider.

Takashi NishideShingo MiyazakiKouichi Sakurai
Published in: J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. (2012)
Keyphrases
  • security analysis
  • smart card
  • public key
  • security requirements
  • computer systems
  • high security
  • real time
  • data mining
  • query processing