Login / Signup

Networked cryptographic devices resilient to capture.

Philip D. MacKenzieMichael K. Reiter
Published in: Int. J. Inf. Sec. (2003)
Keyphrases
  • mobile devices
  • smart card
  • real world
  • hash functions
  • data sets
  • embedded devices
  • information systems
  • mobile applications
  • security protocols