How to break fraud-detectable key recovery
| Title: | How to break fraud-detectable key recovery |
|---|---|
| Authors: | Pfitzmann, Birgit; Waidner, Michael |
| Source: | ACM SIGOPS Operating Systems Review. 32(1):23-28 |
| Availability: | http://dl.acm.org/doi/10.1145/280559.280563 |
| Database: | ACM Full-Text Collection |