Login / Signup

Ticket and Challenge-Based Protocols for Timestamping.

Mohammad PeyravianStephen M. MatyasAllen RoginskyNevenko Zunic
Published in: Comput. Secur. (2000)
Keyphrases
  • service providers
  • database
  • data structure
  • data mining
  • information systems
  • feature selection
  • case study
  • communication protocols
  • network protocols