Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Preview
Unable to display preview. Download preview PDF.
Rights and permissions
Copyright information
© 1989 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
(1989). Applications. In: Modern Cryptology. Lecture Notes in Computer Science, vol 325. Springer, New York, NY. https://doi.org/10.1007/BFb0040279
Download citation
DOI: https://doi.org/10.1007/BFb0040279
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-0-387-96842-1
Online ISBN: 978-0-387-34775-2
eBook Packages: Springer Book Archive