Amanote Research

Amanote Research

    RegisterSign In

Restrictive Binding of Secret-Key Certificates

Lecture Notes in Computer Science - Germany
doi 10.1007/3-540-49264-x_19
Full Text
Open PDF
Abstract

Available in full text

Categories
Computer ScienceTheoretical Computer Science
Date

January 1, 1995

Authors
Stefan Brands
Publisher

Springer Berlin Heidelberg


Related search

Securing M2m Post-Quantum Secret Key Cryptography

IOSR Journal of Electronics and Communication Engineering
2014English

An Investigation of DUA Caching Strategies for Public Key Certificates

1993English

Secret Distribution of Keys for Public-Key Systems

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1988English

Secret Key Generation by Virtual Link Estimation

2015English

Secret Key Transaction Authentication for DNS (TSIG)

2000English

Novel Secret Key Generation Techniques Using Memristor Devices

AIP Advances
NanotechnologyAstronomyPhysicsNanoscience
2016English

Resource-Efficient Common Randomness and Secret-Key Schemes

2018English

Verification of Secret Key Generation From UWB Channel Observations

2009English

Architecture for the Secret-Key Bc3 Cryptography Algorithm

ITB Journal of Information and Communication Technology
2011English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy