Login / Signup
Protecting Shared Cryptographic Keys.
George I. Davida
Richard A. DeMillo
Richard J. Lipton
Published in:
IEEE Symposium on Security and Privacy (1980)
Keyphrases
</>
hash functions
smart card
secret key
real world
website
machine learning
knowledge base
privacy preserving
security protocols
privacy issues