Protecting Cryptographic Keys: The Trace-and-Revoke Approach

Dalit Naor, Moni Naor. Protecting Cryptographic Keys: The Trace-and-Revoke Approach. IEEE Computer, 36(7):47-53, 2003. [doi]

@article{NaorN03,
  title = {Protecting Cryptographic Keys: The Trace-and-Revoke Approach},
  author = {Dalit Naor and Moni Naor},
  year = {2003},
  url = {http://csdl.computer.org/comp/mags/co/2003/07/r7047abs.htm},
  tags = {systematic-approach},
  researchr = {https://researchr.org/publication/NaorN03},
  cites = {0},
  citedby = {0},
  journal = {IEEE Computer},
  volume = {36},
  number = {7},
  pages = {47-53},
}