@dblp

Update on Cryptography: Who Will Keep the Keys?

. Information Systems Security, 3 (3): 16-22 (1994)

Links and resources

Tags