Login / Signup
Simplified pairing computation and security implications.
Steven D. Galbraith
Colm O'hEigeartaigh
Caroline Sheedy
Published in:
J. Math. Cryptol. (2007)
Keyphrases
</>
information security
access control
security problems
intrusion detection
network security
real time
data sets
web services
wireless sensor networks
intrusion detection system
security policies
security requirements
security mechanisms
security properties
security threats
security management