Secure names for bit-strings
- 1 April 1997
- proceedings article
- Published by Association for Computing Machinery (ACM)
Abstract
No abstract availableThis publication has 7 references indexed in Scilit:
- The use of encryption to ensure the integrity of reusable software componentsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Collision Free Hash Functions and Public Key Signature SchemesPublished by Springer Nature ,2000
- Functional Requirements for Uniform Resource NamesPublished by RFC Editor ,1994
- Improving the Efficiency and Reliability of Digital Time-StampingPublished by Springer Nature ,1993
- The MD5 Message-Digest AlgorithmPublished by RFC Editor ,1992
- One way functions and pseudorandom generatorsCombinatorica, 1987
- Protocols for Public Key CryptosystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1980