scientific article; zbMATH DE number 1759314
From MaRDI portal
Publication:4536249
zbMATH Open0994.68612MaRDI QIDQ4536249FDOQ4536249
Authors: Kevin S. McCurley
Publication date: 13 October 2002
Title of this publication is not available (Why is that?)
Recommendations
Computing methodologies and applications (68U99) Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Computing methodologies for information systems (hypertext navigation, interfaces, decision support, etc.) (68U35) Network design and communication in computer systems (68M10)
Cited In (9)
- Stone knives and bear skins: why does the internet run on pre-historic cryptography? (Abstract)
- Will Internet ever be secure?
- Breaking the traditional computer security research barriers
- Title not available (Why is that?)
- Use of ID-based cryptography for the efficient verification of the integrity and authenticity of web resources
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4536249)