Login / Signup
Hierarchical key assignment without public-key cryptography.
Chu-Hsing Lin
Published in:
Comput. Secur. (2001)
Keyphrases
</>
public key cryptography
public key
public key infrastructure
authentication and key agreement
low cost
elliptic curve
provably secure