Login / Signup
Networked cryptographic devices resilient to capture.
Philip D. MacKenzie
Michael K. Reiter
Published in:
Int. J. Inf. Sec. (2003)
Keyphrases
</>
mobile devices
smart card
real world
hash functions
data sets
embedded devices
information systems
mobile applications
security protocols