Login / Signup

Applying a cryptographic namespace to applications.

Miika KomuSasu TarkomaJaakko KangasharjuAndrei V. Gurtov
Published in: DIN@MobiCom (2005)
Keyphrases
  • lower bound
  • smart card
  • data sets
  • data streams
  • security protocols