Sciweavers

90
Voted
INFORMATICALT
2008
105views more  INFORMATICALT 2008»
15 years 7 days ago
Public Key Authentication Schemes for Local Area Networks
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Tzungher Chen, Gwoboa Horng, Chuan-Sheng Yang