How to expose an eavesdropper
- 1 April 1984
- journal article
- Published by Association for Computing Machinery (ACM) in Communications of the ACM
- Vol. 27 (4) , 393-394
- https://doi.org/10.1145/358027.358053
Abstract
No abstract availableKeywords
This publication has 1 reference indexed in Scilit:
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978