Return to Article Details Architectures, Security Issues, and Usage Scenarios of EC Download Download PDF