Login / Signup

Hierarchical key assignment without public-key cryptography.

Chu-Hsing Lin
Published in: Comput. Secur. (2001)
Keyphrases
  • public key cryptography
  • public key
  • public key infrastructure
  • authentication and key agreement
  • low cost
  • elliptic curve
  • provably secure