Login / Signup
Tracking cryptographic keys and encrypted data using position verification.
Máté Galambos
László Bacsárdi
Published in:
IET Quantum Commun. (2020)
Keyphrases
</>
encryption scheme
encrypted data
hash functions
real time
secret key
homomorphic encryption
smart card
third party
data storage
sensitive data
web services
service providers
image sequences
integrity constraints
standard model
ciphertext
information systems