Login / Signup
Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption.
Yang Lu
Jiguo Li
Junmo Xiao
Published in:
ISECS (2008)
Keyphrases
</>
databases
neural network
real time
database
data mining
case study
security analysis
key exchange
encryption algorithms