Commercialization of cryptography
Presents the major approaches for achieving commercial security on the Internet, public key and key escrow. Discusses the implications of (US) legislation putting limitations on the type or strength of key it is best to employ for a given business. Presents the typical modes of delivering authentication and other services.
No Reference information available - sign in for access.
No Citation information available - sign in for access.
No Supplementary Data.
No Article Media