Subject
Computer Science Applications,Information Systems,Signal Processing,Theoretical Computer Science
Reference7 articles.
1. Safeguarding cryptographic keys;Blakley,1979
2. A user authentication system not requiring secrecy in the computer;Evans;Comm. ACM,1974
3. The search for provably secure cryptosystems;Goldwasser,1990
4. Cryptographic authentication of time-invariant quantities;Lennon;IEEE Trans. Commun.,1981
5. Password authentication using Newton's interpolating polynomials;Lin;Inform. Systems,1991
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献