Login / Signup
Further developments in the field of encryption and digital signatures.
Chris Pounder
Published in:
Comput. Secur. (1998)
Keyphrases
</>
digital signature
public key
smart card
key management
public key cryptography
elliptic curve
security mechanisms
signature scheme
digital watermarking
databases
data integrity
resource constrained
security model
private key