An authenticated camera
暂无分享,去创建一个
[1] James H. Burrows,et al. Secure Hash Standard , 1995 .
[2] Dorothy E. Denning,et al. Location-based authentication: Grounding cyberspace for better security , 1996 .
[3] Bruce Schneier,et al. Automatic Event-Stream Notarization Using Digital Signatures , 1996, Security Protocols Workshop.
[4] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[5] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[6] Samy Bengio,et al. Special Uses and Abuses of the Fiat-Shamir Passport Protocol , 1987, CRYPTO.