Login / Signup
Plug-and-Play PKI: A PKI Your Mother Can Use.
Peter Gutmann
Published in:
USENIX Security Symposium (2003)
Keyphrases
</>
public key infrastructure
public key
security mechanisms
public key cryptography
digital watermarking
information exchange
security policies
digital signature
wireless sensor networks
elliptic curve
information retrieval
digital images
access control
trust model
watermarking algorithm
resource constrained