Login / Signup

Periodic K-Times Anonymous Authentication With Efficient Revocation of Violator's Credential.

Bin LianGongliang ChenMaode MaJianhua Li
Published in: IEEE Trans. Inf. Forensics Secur. (2015)
Keyphrases
  • data sets
  • access control
  • cost effective
  • neural network
  • peer to peer
  • lightweight
  • security mechanisms
  • security analysis
  • key distribution
  • authentication scheme