Login / Signup

Escrowed decryption protocols for lawful interception of encrypted data.

David NuñezIsaac AgudoJavier López
Published in: IET Inf. Secur. (2019)
Keyphrases