Login / Signup
Protecting Cryptographic Keys: The Trace-and-Revoke Approach.
Dalit Naor
Moni Naor
Published in:
Computer (2003)
Keyphrases
</>
hash functions
smart card
secret key
secure communication
security protocols
similarity search
neural network
access control
privacy preservation
high assurance
differential power analysis
data sets
cryptographic protocols