Protecting Cryptographic Keys: The Trace-and-Revoke Approach

Dalit Naor, Moni Naor. Protecting Cryptographic Keys: The Trace-and-Revoke Approach. IEEE Computer, 36(7):47-53, 2003. [doi]

References

No references recorded for this publication.

Cited by

No citations of this publication recorded.