Login / Signup
Applying a cryptographic namespace to applications.
Miika Komu
Sasu Tarkoma
Jaakko Kangasharju
Andrei V. Gurtov
Published in:
DIN@MobiCom (2005)
Keyphrases
</>
lower bound
smart card
data sets
data streams
security protocols