Login / Signup
Secure Names for Bit-Strings.
Stuart Haber
W. Scott Stornetta
Published in:
CCS (1997)
Keyphrases
</>
bit strings
key management
lightweight
security requirements
cryptographic protocols
authentication scheme
database
named entities
information security
highly efficient
security mechanisms
security analysis
security protocols
arbitrary length
key exchange protocol
covert channel