15 research outputs found

    The activity diagram.

    Full text link
    <p>The activity diagram.</p

    A comparison on the security notions of obfuscation for different signature-related schemes.

    Full text link
    <p>Acronyms used in the above table are explained as follows</p><p>• Dependent Oracle (DO)</p><p>• Restricted Dependent Oracle (RDO)</p><p>• Existential Unforgeability (EU)</p><p>• Encrypted Blind Signature (EBS)</p><p>• Encrypted Verifiably Encrypted Signatures (EVES)</p><p>A comparison on the security notions of obfuscation for different signature-related schemes.</p

    An application in a privacy-preserving emergency call system based on mobile social network.

    Full text link
    <p>An application in a privacy-preserving emergency call system based on mobile social network.</p

    Some of the scenarios that Definition 3 should be used.

    Full text link
    <p>Some of the scenarios that Definition 3 should be used.</p

    The algorithms of <i>

    Full text link
    <p>The algorithms of <i></i> in the Game2.</p
    corecore