Login / Signup
Secure Local Configuration of Intellectual Property Without a Trusted Third Party.
Nadir Khan
Arthur Silitonga
Brian Pachideh
Sven Nitzsche
Jürgen Becker
Published in:
ARC (2019)
Keyphrases
</>
intellectual property
trusted third party
digital signature
third party
credit card
security services
authentication protocol
privacy protection
key distribution
single point of failure
e government
smart card
digital libraries
key management
security mechanisms
public key
low cost
end users
information systems