CryptoDB
How to detect unauthorised usage of a key
Authors: | |
---|---|
Download: |
BibTeX
@article{eprint-2015-26589, title={How to detect unauthorised usage of a key}, journal={IACR Cryptology ePrint Archive}, volume={2015}, pages={486}, url={https://eprint.iacr.org/2015/486}, author={Jiangshan Yu and Mark Ryan and Cas J.F. Cremers}, year=2015 }