Login / Signup
Key Recycling in Authentication.
Christopher Portmann
Published in:
IEEE Trans. Inf. Theory (2014)
Keyphrases
</>
database
real world
search algorithm
high security