Login / Signup
Expiration and Revocation of Keys for Attribute-based Signatures.
Stephen R. Tate
Roopa Vishwanathan
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
signature verification
access control
rfid tags
digital signature
data sets
public key
secret key
key management
signature scheme
signature recognition
database
neural network
machine learning
electronic commerce
hash functions
resource constrained