Journal of Network and Computer Applications
Research note: Authenticity of public keys in asymmetric cryptosystems
Computer Communications
Hi-index | 0.25 |
Reliance on electronic communications makes information more vulnerable, and users will require confidentiality, message integrity, sender authentication, and sender non-repudiation. Public key cryptography will play an important role in providing these services