Login / Signup

Heterogeneous deniable authentication and its application to e-voting systems.

Chunhua JinGuanhua ChenChanghui YuJianyang ZhaoYing JinJinsong Shan
Published in: J. Inf. Secur. Appl. (2019)
Keyphrases
  • authentication protocol
  • management system
  • computer systems
  • response time
  • distributed systems
  • biometric systems
  • security analysis