Login / Signup
User Impersonation in Key Certification Schemes.
Arjen K. Lenstra
Yacov Yacobi
Published in:
J. Cryptol. (1993)
Keyphrases
</>
user interface
user defined
smart card
user interaction
user preferences
third party
user feedback
security analysis
data sets
recommender systems
collaborative filtering
low cost
user profiles
user model
user input