Login / Signup

Another approach to software key escrow encryption.

Ed DawsonHe Jingmin
Published in: ACISP (1996)
Keyphrases
  • software development
  • computer systems
  • software design
  • high security
  • data encryption standard
  • embedded systems
  • software architecture
  • third party
  • data sets
  • source code
  • test cases
  • software systems
  • software testing