Login / Signup
New hierarchical assignment without Public Key cryptography.
Hung-Yu Chien
Jinn-ke Jan
Published in:
Comput. Secur. (2003)
Keyphrases
</>
public key cryptography
public key
elliptic curve
security model
authentication and key agreement
security services
provably secure
public key infrastructure
elliptic curve cryptography
database
security analysis
digital signature