Login / Signup

A Countermeasure of Fake Root Key Installation Using One-Time Hash Chain.

YoungGyo LeeJeonghee AhnSeungjoo KimDongho Won
Published in: KES-AMSTA (2007)
Keyphrases
  • hash functions
  • real time
  • real world
  • databases
  • machine learning
  • web services
  • case study
  • multi agent