Login / Signup
Protecting Encrypted Signature Functions Against Intrusions on Computing Devices by Obfuscation.
Yang Shi
Jingxuan Han
Hongfei Fan
Qinpei Zhao
Qin Liu
Published in:
IEEE Access (2016)
Keyphrases
</>
computing devices
ubiquitous computing
distributed computing
pervasive computing
mobile devices
intrusion detection
personal computer
peer to peer