Dalit Naor, Moni Naor. Protecting Cryptographic Keys: The Trace-and-Revoke Approach. IEEE Computer, 36(7):47-53, 2003. [doi]
@article{NaorN03, title = {Protecting Cryptographic Keys: The Trace-and-Revoke Approach}, author = {Dalit Naor and Moni Naor}, year = {2003}, url = {http://csdl.computer.org/comp/mags/co/2003/07/r7047abs.htm}, tags = {systematic-approach}, researchr = {https://researchr.org/publication/NaorN03}, cites = {0}, citedby = {0}, journal = {IEEE Computer}, volume = {36}, number = {7}, pages = {47-53}, }