Login / Signup

Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow.

Feng BaoRobert H. DengYongfei HanAlbert B. Jeng
Published in: ACISP (1997)
Keyphrases