Login / Signup
Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credential.
Bin Lian
Gongliang Chen
Maode Ma
Jianhua Li
Published in:
IEEE Trans. Inf. Forensics Secur. (2015)
Keyphrases
</>
data sets
access control
cost effective
neural network
peer to peer
lightweight
security mechanisms
security analysis
key distribution
authentication scheme