Login / Signup

Protecting Shared Cryptographic Keys.

George I. DavidaRichard A. DeMilloRichard J. Lipton
Published in: IEEE Symposium on Security and Privacy (1980)
Keyphrases
  • hash functions
  • smart card
  • secret key
  • real world
  • website
  • machine learning
  • knowledge base
  • privacy preserving
  • security protocols
  • privacy issues