NDSS   1999 Network and Distributed System Security Symposium
Wall of Fame | Most Viewed NDSS-1999 Paper
12 years 2 months ago
Addressing the Problem of Undetected Signature Key Compromise
Suppose that messages have been signed using a user's signature private key during the period of time after a key compromise but before the compromise is detected. This is a ...
Mike Just, Paul C. van Oorschot
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source139
2Download preprint from source117
3Download preprint from source99
4Download preprint from source95
5Download preprint from source87
6Download preprint from source87
7Download preprint from source81
8Download preprint from source77
9Download preprint from source70
10Download preprint from source68
11Download preprint from source57
12Download preprint from source43