Trade-Offs in Cryptographic Implementations of Temporal Access Control

Lecture Notes in Computer Science - Germany
doi 10.1007/978-3-642-04766-4_6
Full Text
Abstract

Available in full text

Date
Authors
Publisher

Springer Berlin Heidelberg