A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Thinking Inside the Box: System-Level Failures of Tamper Proofing
SP '08 Proceedings of the 2008 IEEE Symposium on Security and Privacy
Hi-index | 0.00 |
In this article we carry out a critical analysis of the benefits and drawbacks which are likely when we include electronic data to hold, validate and process the information used to generate and manage an identity. In addition, we consider the potential knock-on impact of this for the transactions which rely on this electronic identity information.