Login / Signup

Non-PKI methods for public key distribution.

Mohammad PeyravianAllen RoginskyNevenko Zunic
Published in: Comput. Secur. (2004)
Keyphrases
  • information systems
  • peer to peer
  • key distribution