Login / Signup
Digital signatures and their uses.
Michael J. Ganley
Published in:
Comput. Secur. (1994)
Keyphrases
</>
digital signature
smart card
public key
key management
signature scheme
security mechanisms
elliptic curve
digital watermarking
data integrity
databases
intrusion detection
network security