Login / Signup
On replacing cryptographic keys in hierarchical key management systems.
Anne V. D. M. Kayem
Selim G. Akl
Patrick Martin
Published in:
J. Comput. Secur. (2008)
Keyphrases
</>
management system
hash functions
secure communication
website
data management
database management systems
hierarchical model
security protocols
private key
encryption key