z-logo
open-access-imgOpen Access
Two Forgeable and Untraceable Batch Authentication Schemes based on Pseudonym
Author(s) -
Xiaoming Hu
Publication year - 2022
Publication title -
proceedings of the 11th international conference on biomedical engineering and bioinformatics
Language(s) - English
Resource type - Conference proceedings
DOI - 10.5220/0011375200003443
Subject(s) - pseudonym , computer science , authentication (law) , computer network , computer security , law , political science

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here