Login / Signup

Key Recycling in Authentication.

Christopher Portmann
Published in: IEEE Trans. Inf. Theory (2014)
Keyphrases
  • database
  • real world
  • search algorithm
  • high security