Login / Signup
Design and Analyses of Two Basic Protocols for Use in TTP-Based Key Escrow.
Feng Bao
Robert H. Deng
Yongfei Han
Albert B. Jeng
Published in:
ACISP (1997)
Keyphrases
</>
database
data sets
user experience
social networks
knowledge based systems
design decisions
neural network
machine learning
artificial intelligence
case study
building blocks
software architecture
design tools
design space
trusted third party