|
Volumn 2005, Issue , 2005, Pages 673-679
|
Efficient non-interactive deniable authentication protocols
|
Author keywords
Authentication; Deniablity; Digital signature; Impersonation attack; MAC; Tight security; Trapdoor permutations
|
Indexed keywords
COMPUTER CRIME;
COMPUTER PRIVACY;
DATA PRIVACY;
ELECTRONIC DOCUMENT IDENTIFICATION SYSTEMS;
SECURITY OF DATA;
AUTHENTICATION;
DENIABLITY;
IMPERSONATION ATTACK;
MAC;
TRAPDOOR PERMUTATIONS;
NETWORK PROTOCOLS;
|
EID: 33746912795
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: None Document Type: Conference Paper |
Times cited : (12)
|
References (12)
|