Privacy Protection in PKIs: A Separation-of-Authority Approach

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 434
  • Download : 0
DC FieldValueLanguage
dc.contributor.authorKwon, T-
dc.contributor.authorCheon, J-
dc.contributor.authorKim, Yongdae-
dc.contributor.authorLee, J-
dc.date.accessioned2013-03-18T23:19:50Z-
dc.date.available2013-03-18T23:19:50Z-
dc.date.issued2006-08-
dc.identifier.citation7th International Workshop on Information Security Applications (WISA) 2006., v., no., pp. --
dc.identifier.urihttp://hdl.handle.net/10203/153535-
dc.languageENG-
dc.publisherKorea Institute of Information Security and cryptology(KIISC)-
dc.titlePrivacy Protection in PKIs: A Separation-of-Authority Approach-
dc.typeConference-
dc.type.rimsCONF-
dc.citation.publicationname7th International Workshop on Information Security Applications (WISA) 2006.-
dc.identifier.conferencecountrySouth Korea-
dc.contributor.localauthorKim, Yongdae-
dc.contributor.nonIdAuthorKwon, T-
dc.contributor.nonIdAuthorCheon, J-
dc.contributor.nonIdAuthorLee, J-
Appears in Collection
EE-Conference Papers(학술회의논문)
Files in This Item
There are no files associated with this item.

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0