Login / Signup
A new copyright protection scheme using the multiple RSA cryptosystems in personal cards for network shopping.
S. Ishii
Published in:
IFIP World Conference on IT Tools (1996)
Keyphrases
</>
protection scheme
signature scheme
elliptic curve
computer networks
communication networks
operating system
network structure
buffer overflow
information systems
motion estimation
public key cryptosystems