Protecting Cryptographic Keys: The Trace-and-Revoke Approach

Dalit Naor, Moni Naor. Protecting Cryptographic Keys: The Trace-and-Revoke Approach. IEEE Computer, 36(7):47-53, 2003. [doi]

Abstract

Abstract is missing.