Login / Signup

Conversion and Proxy Functions for Symmetric Key Ciphers.

Debra L. CookAngelos D. Keromytis
Published in: ITCC (1) (2005)
Keyphrases
  • security protocols
  • e government
  • lightweight
  • end to end
  • public key
  • key management