Login / Signup
Authentication Schemes Using Polynomials Over Non-Commutative Rings
Maheswara Rao Valluri
Published in:
CoRR (2013)
Keyphrases
</>
database
case study
security mechanisms
authentication scheme
authentication mechanism
hermite transform