Login / Signup

IC-Cards in High-Security Applications.

Ingrid Schaumüller-Bichl
Published in: EUROCRYPT (1987)
Keyphrases
  • high security
  • image encryption
  • security analysis
  • encryption algorithm
  • information sharing
  • distributed environment
  • public key