Subliminal-free authentication and signature
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
Abuses in cryptography and how to fight them
CRYPTO '88 Proceedings on Advances in cryptology
Towards practical “proven secure” authenticated key distribution
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
On the Risk of Opening Distributed Keys
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Hi-index | 0.09 |
The significance of the treaty between the US and the USSR, which bans intermediate-range nuclear forces, is discussed and possible pitfalls are examined. The technologies needed for effective on-site inspection are described. The problems posed by Soviets visiting sensitive US installations and the destruction of weaponry are considered