Threshold identity authentication signature: Impersonation prevention in social network services.
Zhanwen ChenJiageng ChenWeizhi MengPublished in: Concurr. Comput. Pract. Exp. (2022)
Keyphrases
- identity authentication
- social network services
- private key
- security analysis
- personal information
- social relationships
- smart card
- public key
- mobile commerce
- social networking
- digital signature
- knowledge sharing
- south african
- information sharing
- social networks
- authentication protocol
- online social
- share knowledge
- signature scheme
- encryption scheme
- data protection
- ciphertext
- communication tools
- network security
- online social networks
- third party
- social media
- information systems