How to insure that data acquired to verify treaty compliance are trustworthy
- 1 May 1988
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in Proceedings of the IEEE
- Vol. 76 (5) , 621-627
- https://doi.org/10.1109/5.4446
Abstract
No abstract availableThis publication has 4 references indexed in Scilit:
- Secure Communications in the Presence of Pervasive DeceitPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1980
- Symmetric and Asymmetric EncryptionACM Computing Surveys, 1979
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976