Map
Index
Random
Help
th

Quote: guarantee unconditional security by restricting the lifetime of each key; simple algorithms for synchronous cards

topics > all references > references g-h > QuoteRef: gilbH9_1998 , p. abstract



Topic:
embedded systems
Topic:
authentication
Topic:
key distribution

Quotation Skeleton

Unconditional security techniques may represent an advantageous alternative … when the number of authentications needed during the … 2 scalar products among binary vectors which are … 10 to 20 bits per authentication), and provide … [p. 185] We assume that the cards or devices … … for the life time of the card key …   Google-1   Google-2

Copyright clearance needed for quotation.


Related Topics up

Topic: embedded systems (26 items)
Topic: authentication (87 items)
Topic: key distribution (33 items)

Copyright © 2002-2008 by C. Bradford Barber. All rights reserved.
Thesa is a trademark of C. Bradford Barber.