Timestamps in key distribution protocols
The distribution of keys in a computer network using single key or public key encryption is discussed. We consider the possibility that communication keys may be…
Timestamps in key distribution protocols
ACM encourages its members to take a direct hand in shaping the future of the association. There are more ways than ever to get involved.
Get Involved