Login / Signup
Securing payments through effective authentication: Evaluating trusted third party proposals for a trust hierarchy in the UK.
Heather Rowe
Published in:
Comput. Law Secur. Rev. (1998)
Keyphrases
</>
public key
digital signature
trusted third party
credit card
third party
trust model
identity management
data mining
digital libraries
wireless networks
security protocols
security services