Sign in

Cryptographic Protocol to Establish Trusted History of Interactions.

Samuel GaliceMarine MinierJohn MullinsStéphane Ubéda
Published in: ESAS (2006)
Keyphrases
  • cryptographic protocols
  • security properties
  • trust relationships
  • real time
  • distributed environment
  • security protocols
  • authentication protocol