"The risks of key recovery, key escrow, and trusted third-party encryption."

Hal Abelson et al. (1997)

Details and statistics

DOI:

access: unavailable

type: Journal Article

metadata version: 2020-08-13

a service of  Schloss Dagstuhl - Leibniz Center for Informatics