Login / Signup

Applying the Fujisaki-Okamoto Conversion to Certificate-based Encryption.

Yang LuJiguo LiJunmo Xiao
Published in: ISECS (2008)
Keyphrases
  • databases
  • neural network
  • real time
  • database
  • data mining
  • case study
  • security analysis
  • key exchange
  • encryption algorithms