Login / Signup
A Practical and Insider Secure Signcryption with Non-interactive Non-repudiation.
Augustin P. Sarr
Papa B. Seye
Togdé Ngarenon
Published in:
C2SI (2019)
Keyphrases
</>
trusted third party
key management
digital signature
key management scheme
security properties
user interaction
third party
hands on guide
real world
standard model
sensitive data
ad hoc networks
elliptic curve
privacy protection
security architecture
mobile payment
lightweight
peer to peer